var-201807-2218
Vulnerability from variot

Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a speculative buffer overflow and side-channel analysis. Intel Systems with microprocessors contain information disclosure vulnerabilities.Information may be obtained. Multiple CPU Hardware are prone to an information-disclosure vulnerability. Attackers can exploit this issue to obtain sensitive information that may aid in further attacks. ARM CPU is a CPU (central processing unit) product of the British ARM company. Intel CPU is a CPU (central processing unit) product of Intel Corporation of the United States. This vulnerability stems from configuration errors in network systems or products during operation. 7) - aarch64, noarch, ppc64le

Bug Fix(es):

  • Kernel panic on job cleanup, related to SyS_getdents64 (BZ#1702057)

  • Kernel modules generated incorrectly when system is localized to non-English language (BZ#1705285)

  • RHEL-Alt-7.6 - Fixup tlbie vs store ordering issue on POWER9 (BZ#1756270)

  • 1713059 - CVE-2019-3846 kernel: Heap overflow in mwifiex_update_bss_desc_with_ie function in marvell/mwifiex/scan.c 1716992 - CVE-2019-10126 kernel: Heap overflow in mwifiex_uap_parse_tail_ies function in drivers/net/wireless/marvell/mwifiex/ie.c 1744130 - CVE-2019-14814 kernel: heap overflow in mwifiex_set_uap_rates() function of Marvell Wifi Driver leading to DoS 1744137 - CVE-2019-14815 kernel: heap-overflow in mwifiex_set_wmm_params() function of Marvell WiFi driver leading to DoS 1744149 - CVE-2019-14816 kernel: heap overflow in mwifiex_update_vs_ie() function of Marvell WiFi driver 1771909 - CVE-2019-17133 kernel: buffer overflow in cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c 1777825 - CVE-2019-18660 kernel: (powerpc) incomplete Spectre-RSB mitigation leads to information exposure

  • 7) - noarch, x86_64

  • Description:

The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. (BZ#1594915)

Bug Fix(es):

  • ovl_create can return positive retval and crash the host (BZ#1696290)

  • THP: Race between MADV_DONTNEED and NUMA hinting node migration code (BZ#1698105)

  • RHEL7.6 - Kernel changes for count cache flush Spectre v2 mitigation (BZ#1708543)

  • Poor system performance from thundering herd of kworkers competing for mddev->flush_bio ownership (BZ#1712762)

  • [RHEL7.7] RAID1 write-behind causes a kernel panic (BZ#1712999)

Enhancement(s):

  • [Intel 7.5 FEAT] i40evf - Update to latest upstream driver version (BZ#1722774)

  • [netdrv] i40e/i40evf: Fix use after free in Rx cleanup path [7.4.z] (BZ#1723831)

Users of kernel are advised to upgrade to these updated packages, which fix these bugs and add these enhancements. 6) - i386, x86_64

Bug Fix(es):

  • The Least recently used (LRU) operations are batched by caching pages in per-cpu page vectors to prevent contention of the heavily used lru_lock spinlock. The page vectors can hold even the compound pages. Previously, the page vectors were cleared only if they were full. Subsequently, the amount of memory held in page vectors, which is not reclaimable, was sometimes too high. Consequently the page reclamation started the Out of Memory (OOM) killing processes. With this update, the underlying source code has been fixed to clear LRU page vectors each time when a compound page is added to them. As a result, OOM killing processes due to high amounts of memory held in page vectors no longer occur. (BZ#1575819)

  • -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256

====================================================================
Red Hat Security Advisory

Synopsis: Important: kernel security and bug fix update Advisory ID: RHSA-2018:2384-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2018:2384 Issue date: 2018-08-14 CVE Names: CVE-2017-13215 CVE-2018-3620 CVE-2018-3646 CVE-2018-3693 CVE-2018-5390 CVE-2018-7566 CVE-2018-10675 ==================================================================== 1. Summary:

An update for kernel is now available for Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

  1. Relevant releases/architectures:

Red Hat Enterprise Linux Client (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - noarch, x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - noarch, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64 Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7) - noarch, ppc64le, s390x Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7) - noarch, ppc64le

  1. Description:

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimisation) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks. (CVE-2018-3620, CVE-2018-3646)

  • An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions past bounds check. The flaw relies on the presence of a precisely-defined instruction sequence in the privileged code and the fact that memory writes occur to an address which depends on the untrusted value. Such writes cause an update into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to influence speculative execution and/or read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3693)

  • A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses. (CVE-2018-5390)

  • kernel: crypto: privilege escalation in skcipher_recvmsg function (CVE-2017-13215)

  • kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact (CVE-2018-10675)

  • kernel: race condition in snd_seq_write() may lead to UAF or OOB access (CVE-2018-7566)

For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.

Red Hat would like to thank Intel OSSIRT (Intel.com) for reporting CVE-2018-3620 and CVE-2018-3646; Vladimir Kiriansky (MIT) and Carl Waldspurger (Carl Waldspurger Consulting) for reporting CVE-2018-3693; and Juha-Matti Tilli (Aalto University, Department of Communications and Networking and Nokia Bell Labs) for reporting CVE-2018-5390.

Bug Fix(es):

These updated kernel packages include also numerous bug fixes. Space precludes documenting all of the bug fixes in this advisory. See the descriptions in the related Knowledge Article:

https://access.redhat.com/articles/3527791

  1. Solution:

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

The system must be rebooted for this update to take effect.

  1. Bugs fixed (https://bugzilla.redhat.com/):

1535173 - CVE-2017-13215 kernel: crypto: privilege escalation in skcipher_recvmsg function 1550142 - CVE-2018-7566 kernel: race condition in snd_seq_write() may lead to UAF or OOB-access 1575065 - CVE-2018-10675 kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact 1581650 - CVE-2018-3693 Kernel: speculative bounds check bypass store 1585005 - CVE-2018-3646 Kernel: hw: cpu: L1 terminal fault (L1TF) 1601704 - CVE-2018-5390 kernel: TCP segments with random offsets allow a remote denial of service (SegmentSmack)

  1. Package List:

Red Hat Enterprise Linux Client (v. 7):

Source: kernel-3.10.0-862.11.6.el7.src.rpm

noarch: kernel-abi-whitelists-3.10.0-862.11.6.el7.noarch.rpm kernel-doc-3.10.0-862.11.6.el7.noarch.rpm

x86_64: kernel-3.10.0-862.11.6.el7.x86_64.rpm kernel-debug-3.10.0-862.11.6.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm kernel-debug-devel-3.10.0-862.11.6.el7.x86_64.rpm kernel-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-862.11.6.el7.x86_64.rpm kernel-devel-3.10.0-862.11.6.el7.x86_64.rpm kernel-headers-3.10.0-862.11.6.el7.x86_64.rpm kernel-tools-3.10.0-862.11.6.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm kernel-tools-libs-3.10.0-862.11.6.el7.x86_64.rpm perf-3.10.0-862.11.6.el7.x86_64.rpm perf-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm python-perf-3.10.0-862.11.6.el7.x86_64.rpm python-perf-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm

Red Hat Enterprise Linux Client Optional (v. 7):

x86_64: kernel-debug-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm kernel-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-862.11.6.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-862.11.6.el7.x86_64.rpm perf-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm python-perf-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm

Red Hat Enterprise Linux ComputeNode (v. 7):

Source: kernel-3.10.0-862.11.6.el7.src.rpm

noarch: kernel-abi-whitelists-3.10.0-862.11.6.el7.noarch.rpm kernel-doc-3.10.0-862.11.6.el7.noarch.rpm

x86_64: kernel-3.10.0-862.11.6.el7.x86_64.rpm kernel-debug-3.10.0-862.11.6.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm kernel-debug-devel-3.10.0-862.11.6.el7.x86_64.rpm kernel-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-862.11.6.el7.x86_64.rpm kernel-devel-3.10.0-862.11.6.el7.x86_64.rpm kernel-headers-3.10.0-862.11.6.el7.x86_64.rpm kernel-tools-3.10.0-862.11.6.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm kernel-tools-libs-3.10.0-862.11.6.el7.x86_64.rpm perf-3.10.0-862.11.6.el7.x86_64.rpm perf-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm python-perf-3.10.0-862.11.6.el7.x86_64.rpm python-perf-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm

Red Hat Enterprise Linux ComputeNode Optional (v. 7):

x86_64: kernel-debug-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm kernel-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-862.11.6.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-862.11.6.el7.x86_64.rpm perf-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm python-perf-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm

Red Hat Enterprise Linux Server (v. 7):

Source: kernel-3.10.0-862.11.6.el7.src.rpm

noarch: kernel-abi-whitelists-3.10.0-862.11.6.el7.noarch.rpm kernel-doc-3.10.0-862.11.6.el7.noarch.rpm

ppc64: kernel-3.10.0-862.11.6.el7.ppc64.rpm kernel-bootwrapper-3.10.0-862.11.6.el7.ppc64.rpm kernel-debug-3.10.0-862.11.6.el7.ppc64.rpm kernel-debug-debuginfo-3.10.0-862.11.6.el7.ppc64.rpm kernel-debug-devel-3.10.0-862.11.6.el7.ppc64.rpm kernel-debuginfo-3.10.0-862.11.6.el7.ppc64.rpm kernel-debuginfo-common-ppc64-3.10.0-862.11.6.el7.ppc64.rpm kernel-devel-3.10.0-862.11.6.el7.ppc64.rpm kernel-headers-3.10.0-862.11.6.el7.ppc64.rpm kernel-tools-3.10.0-862.11.6.el7.ppc64.rpm kernel-tools-debuginfo-3.10.0-862.11.6.el7.ppc64.rpm kernel-tools-libs-3.10.0-862.11.6.el7.ppc64.rpm perf-3.10.0-862.11.6.el7.ppc64.rpm perf-debuginfo-3.10.0-862.11.6.el7.ppc64.rpm python-perf-3.10.0-862.11.6.el7.ppc64.rpm python-perf-debuginfo-3.10.0-862.11.6.el7.ppc64.rpm

ppc64le: kernel-3.10.0-862.11.6.el7.ppc64le.rpm kernel-bootwrapper-3.10.0-862.11.6.el7.ppc64le.rpm kernel-debug-3.10.0-862.11.6.el7.ppc64le.rpm kernel-debug-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm kernel-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-862.11.6.el7.ppc64le.rpm kernel-devel-3.10.0-862.11.6.el7.ppc64le.rpm kernel-headers-3.10.0-862.11.6.el7.ppc64le.rpm kernel-tools-3.10.0-862.11.6.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm kernel-tools-libs-3.10.0-862.11.6.el7.ppc64le.rpm perf-3.10.0-862.11.6.el7.ppc64le.rpm perf-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm python-perf-3.10.0-862.11.6.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm

s390x: kernel-3.10.0-862.11.6.el7.s390x.rpm kernel-debug-3.10.0-862.11.6.el7.s390x.rpm kernel-debug-debuginfo-3.10.0-862.11.6.el7.s390x.rpm kernel-debug-devel-3.10.0-862.11.6.el7.s390x.rpm kernel-debuginfo-3.10.0-862.11.6.el7.s390x.rpm kernel-debuginfo-common-s390x-3.10.0-862.11.6.el7.s390x.rpm kernel-devel-3.10.0-862.11.6.el7.s390x.rpm kernel-headers-3.10.0-862.11.6.el7.s390x.rpm kernel-kdump-3.10.0-862.11.6.el7.s390x.rpm kernel-kdump-debuginfo-3.10.0-862.11.6.el7.s390x.rpm kernel-kdump-devel-3.10.0-862.11.6.el7.s390x.rpm perf-3.10.0-862.11.6.el7.s390x.rpm perf-debuginfo-3.10.0-862.11.6.el7.s390x.rpm python-perf-3.10.0-862.11.6.el7.s390x.rpm python-perf-debuginfo-3.10.0-862.11.6.el7.s390x.rpm

x86_64: kernel-3.10.0-862.11.6.el7.x86_64.rpm kernel-debug-3.10.0-862.11.6.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm kernel-debug-devel-3.10.0-862.11.6.el7.x86_64.rpm kernel-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-862.11.6.el7.x86_64.rpm kernel-devel-3.10.0-862.11.6.el7.x86_64.rpm kernel-headers-3.10.0-862.11.6.el7.x86_64.rpm kernel-tools-3.10.0-862.11.6.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm kernel-tools-libs-3.10.0-862.11.6.el7.x86_64.rpm perf-3.10.0-862.11.6.el7.x86_64.rpm perf-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm python-perf-3.10.0-862.11.6.el7.x86_64.rpm python-perf-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm

Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7):

noarch: kernel-abi-whitelists-3.10.0-862.11.6.el7.noarch.rpm kernel-doc-3.10.0-862.11.6.el7.noarch.rpm

ppc64le: kernel-3.10.0-862.11.6.el7.ppc64le.rpm kernel-bootwrapper-3.10.0-862.11.6.el7.ppc64le.rpm kernel-debug-3.10.0-862.11.6.el7.ppc64le.rpm kernel-debug-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm kernel-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-862.11.6.el7.ppc64le.rpm kernel-devel-3.10.0-862.11.6.el7.ppc64le.rpm kernel-headers-3.10.0-862.11.6.el7.ppc64le.rpm kernel-tools-3.10.0-862.11.6.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm kernel-tools-libs-3.10.0-862.11.6.el7.ppc64le.rpm perf-3.10.0-862.11.6.el7.ppc64le.rpm perf-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm python-perf-3.10.0-862.11.6.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm

s390x: kernel-3.10.0-862.11.6.el7.s390x.rpm kernel-debug-3.10.0-862.11.6.el7.s390x.rpm kernel-debug-debuginfo-3.10.0-862.11.6.el7.s390x.rpm kernel-debug-devel-3.10.0-862.11.6.el7.s390x.rpm kernel-debuginfo-3.10.0-862.11.6.el7.s390x.rpm kernel-debuginfo-common-s390x-3.10.0-862.11.6.el7.s390x.rpm kernel-devel-3.10.0-862.11.6.el7.s390x.rpm kernel-headers-3.10.0-862.11.6.el7.s390x.rpm kernel-kdump-3.10.0-862.11.6.el7.s390x.rpm kernel-kdump-debuginfo-3.10.0-862.11.6.el7.s390x.rpm kernel-kdump-devel-3.10.0-862.11.6.el7.s390x.rpm perf-3.10.0-862.11.6.el7.s390x.rpm perf-debuginfo-3.10.0-862.11.6.el7.s390x.rpm python-perf-3.10.0-862.11.6.el7.s390x.rpm python-perf-debuginfo-3.10.0-862.11.6.el7.s390x.rpm

Red Hat Enterprise Linux Server Optional (v. 7):

ppc64: kernel-debug-debuginfo-3.10.0-862.11.6.el7.ppc64.rpm kernel-debuginfo-3.10.0-862.11.6.el7.ppc64.rpm kernel-debuginfo-common-ppc64-3.10.0-862.11.6.el7.ppc64.rpm kernel-tools-debuginfo-3.10.0-862.11.6.el7.ppc64.rpm kernel-tools-libs-devel-3.10.0-862.11.6.el7.ppc64.rpm perf-debuginfo-3.10.0-862.11.6.el7.ppc64.rpm python-perf-debuginfo-3.10.0-862.11.6.el7.ppc64.rpm

ppc64le: kernel-debug-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm kernel-debug-devel-3.10.0-862.11.6.el7.ppc64le.rpm kernel-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-862.11.6.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm kernel-tools-libs-devel-3.10.0-862.11.6.el7.ppc64le.rpm perf-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm

x86_64: kernel-debug-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm kernel-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-862.11.6.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-862.11.6.el7.x86_64.rpm perf-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm python-perf-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm

Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7):

noarch: kernel-doc-3.10.0-862.11.6.el7.noarch.rpm

ppc64le: kernel-debug-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm kernel-debug-devel-3.10.0-862.11.6.el7.ppc64le.rpm kernel-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-862.11.6.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm kernel-tools-libs-devel-3.10.0-862.11.6.el7.ppc64le.rpm perf-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm

Red Hat Enterprise Linux Workstation (v. 7):

Source: kernel-3.10.0-862.11.6.el7.src.rpm

noarch: kernel-abi-whitelists-3.10.0-862.11.6.el7.noarch.rpm kernel-doc-3.10.0-862.11.6.el7.noarch.rpm

x86_64: kernel-3.10.0-862.11.6.el7.x86_64.rpm kernel-debug-3.10.0-862.11.6.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm kernel-debug-devel-3.10.0-862.11.6.el7.x86_64.rpm kernel-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-862.11.6.el7.x86_64.rpm kernel-devel-3.10.0-862.11.6.el7.x86_64.rpm kernel-headers-3.10.0-862.11.6.el7.x86_64.rpm kernel-tools-3.10.0-862.11.6.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm kernel-tools-libs-3.10.0-862.11.6.el7.x86_64.rpm perf-3.10.0-862.11.6.el7.x86_64.rpm perf-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm python-perf-3.10.0-862.11.6.el7.x86_64.rpm python-perf-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm

Red Hat Enterprise Linux Workstation Optional (v. 7):

x86_64: kernel-debug-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm kernel-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-862.11.6.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-862.11.6.el7.x86_64.rpm perf-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm python-perf-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/

  1. References:

https://access.redhat.com/security/cve/CVE-2017-13215 https://access.redhat.com/security/cve/CVE-2018-3620 https://access.redhat.com/security/cve/CVE-2018-3646 https://access.redhat.com/security/cve/CVE-2018-3693 https://access.redhat.com/security/cve/CVE-2018-5390 https://access.redhat.com/security/cve/CVE-2018-7566 https://access.redhat.com/security/cve/CVE-2018-10675 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/security/vulnerabilities/L1TF https://access.redhat.com/articles/3527791

  1. Contact:

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/

Copyright 2018 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1

iQIVAwUBW3MjONzjgjWX9erEAQioYA/9Ge//K50oCrGaDEMuI2PHYLcztiZt9meh C578LP6sC/HT17VAbV8C+Tvy9QBCU80t4mGU4GOPu8Q5HzZQv45n0NtdRTGCC+yb A1bFcf0vhXIALNsuDEZN9g5SwUBapxkRoh43R+E7ITCQWp0XIPaSjYgGNqpTTuD/ lxRCzc10HhxW+pUY+ERFcK6c0poc14FtSqM3GqZe10FhkykdIlmngFjkthjzefXO dUkYDy53G+iAdTrVFI03h3Wt+UBMmNwKtu8ydqtAxZ0zDZIP5ijASOtM4mlf77ec VsNn7OWythkpTcpa+Sh5+dk6DK+lU2vziVsEocYNpzB+T/aHC9n/+I8ibfp3B4DC k4lYqZJQDFR2jVABjkOVS9dWFlOYKFmU2JBwsqdRvt3rgVFXEH3n5OQydHGFskmP NFwDbRAFlwo3zjd9KuiQzdFTOensc35+eSHykY8nxY2hGMH5gGccShFL4C7N2mtx s8JnzA/Zj00VHMg8qIHGfQ7RSd/xyEJ5vn87WZcTshTNli6x1/0VnzpTKG85Ga+K S2EJDXFP9LqCT98TL1RDJmCTtfDjU3I/gbgu5xFaofQZfV48qAUomUQ2E+MhQAOX eBr/OvlfFP8HEwVEJBDtXKxxs1LgmjTSqOtfP8AvS5zI9/Y6o56i0d7Ng1CcaGKP lZgWJhC3Yik=i4St -----END PGP SIGNATURE-----

-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201807-2218",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "celeron n",
            scope: "eq",
            trust: 1.6,
            vendor: "intel",
            version: "n3000",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1.6,
            vendor: "intel",
            version: "965",
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1.6,
            vendor: "intel",
            version: "330e",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1.6,
            vendor: "intel",
            version: "970",
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1.6,
            vendor: "intel",
            version: "4360t",
         },
         {
            model: "atom x3",
            scope: "eq",
            trust: 1.6,
            vendor: "intel",
            version: "c3445",
         },
         {
            model: "celeron n",
            scope: "eq",
            trust: 1.6,
            vendor: "intel",
            version: "n4100",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1.6,
            vendor: "intel",
            version: "960",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "5287u",
         },
         {
            model: "xeon e5 2470 v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2687w_v2",
         },
         {
            model: "enterprise linux server eus",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "7.5",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "3450",
         },
         {
            model: "xeon",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "e5540",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2655le",
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8880l_v3",
         },
         {
            model: "xeon e3 1270 v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4669_v4",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4350u",
         },
         {
            model: "xeon",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "e6510",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2435m",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "875k",
         },
         {
            model: "xeon",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "e5503",
         },
         {
            model: "xeon gold",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "6148",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4980hq",
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4360",
         },
         {
            model: "xeon e5 1660 v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "atom c",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "c3850",
         },
         {
            model: "xeon",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "x5687",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2617m",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "3770",
         },
         {
            model: "xeon",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "ec5509",
         },
         {
            model: "xeon e3 1260l v5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2695_v3",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "670",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4422e",
         },
         {
            model: "atom c",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "c2718",
         },
         {
            model: "xeon e3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "1585l_v5",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "3230m",
         },
         {
            model: "xeon",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "l5518",
         },
         {
            model: "celeron j",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "j4005",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "3317u",
         },
         {
            model: "xeon e3 1226 v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3 1241 v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4870",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2699_v4",
         },
         {
            model: "xeon e3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "1535m_v5",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4900mq",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "3612qm",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "3380m",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2690_v4",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4330m",
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8867l",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2687w_v3",
         },
         {
            model: "xeon e-1105c",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4012y",
         },
         {
            model: "xeon e5 1650",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4670r",
         },
         {
            model: "xeon phi",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "7250",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4722hq",
         },
         {
            model: "xeon e3 1501m v6",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core m3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "6y30",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4790t",
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4809_v4",
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8880_v4",
         },
         {
            model: "xeon gold",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "6154",
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "3220",
         },
         {
            model: "xeon e5 2448l v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon platinum",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8160t",
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2312m",
         },
         {
            model: "xeon e3 1285l v4",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4655_v4",
         },
         {
            model: "xeon platinum",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8180",
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "6300t",
         },
         {
            model: "atom x3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "c3405",
         },
         {
            model: "celeron n",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "n3350",
         },
         {
            model: "xeon e3 1230 v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8891_v3",
         },
         {
            model: "xeon",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "l5638",
         },
         {
            model: "celeron j",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "j1750",
         },
         {
            model: "xeon e5 2403",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "6350hq",
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8860",
         },
         {
            model: "xeon gold",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "6146",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4570r",
         },
         {
            model: "xeon",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "x5550",
         },
         {
            model: "xeon gold",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "6140",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "3350p",
         },
         {
            model: "xeon",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "e5630",
         },
         {
            model: "xeon gold",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "6136",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "980",
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4120u",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4670",
         },
         {
            model: "xeon",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "w5580",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "820qm",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2640m",
         },
         {
            model: "xeon e3 1280 v5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "w3680",
         },
         {
            model: "core m3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "7y30",
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2850",
         },
         {
            model: "atom c",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "c2338",
         },
         {
            model: "xeon gold",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "5122",
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4809_v3",
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4160",
         },
         {
            model: "enterprise linux desktop",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "7.0",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4657l_v2",
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4158u",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "6400t",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4610m",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4960hq",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "5750hq",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "640um",
         },
         {
            model: "xeon e3 1230 v5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4360u",
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4830_v3",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4627_v4",
         },
         {
            model: "xeon",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "l7555",
         },
         {
            model: "xeon gold",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "6142m",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "3667u",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4300y",
         },
         {
            model: "celeron n",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "n3160",
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2367m",
         },
         {
            model: "atom z",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "z3740",
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4130",
         },
         {
            model: "enterprise linux workstation",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "6.0",
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "6102e",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "560um",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4460s",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "3687u",
         },
         {
            model: "xeon e3 1225 v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "6100u",
         },
         {
            model: "core m",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "5y10",
         },
         {
            model: "xeon",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "l5618",
         },
         {
            model: "xeon e5 2418l",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5 2648l v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "atom e",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "e3827",
         },
         {
            model: "xeon silver",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4114t",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4610",
         },
         {
            model: "xeon e5 2618l v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "celeron n",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "n2806",
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2350m",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "3340s",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "6200u",
         },
         {
            model: "xeon e5 2440",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5 2603 v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon phi",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "7210",
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2890_v2",
         },
         {
            model: "xeon",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "x6550",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8250u",
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2348m",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4690t",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4771",
         },
         {
            model: "xeon e3 1285 v6",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "cortex-a",
            scope: "eq",
            trust: 1,
            vendor: "arm",
            version: "12",
         },
         {
            model: "xeon gold",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "6130f",
         },
         {
            model: "xeon e5 2618l v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5 2640 v4",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5 2618l v4",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "celeron j",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "j1850",
         },
         {
            model: "xeon gold",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "6134",
         },
         {
            model: "xeon e3 1276 v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "atom z",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "z3460",
         },
         {
            model: "xeon e3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "1575m_v5",
         },
         {
            model: "cortex-a",
            scope: "eq",
            trust: 1,
            vendor: "arm",
            version: "76",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2690",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4627_v3",
         },
         {
            model: "xeon e3 1240 v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5 2620 v4",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "m12-2s",
            scope: "lt",
            trust: 1,
            vendor: "fujitsu",
            version: "xcp3090",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4702mq",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4627_v2",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2820qm",
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4807",
         },
         {
            model: "xeon e5 2407 v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4712mq",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2380p",
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2115c",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2520m",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "680um",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "640m",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2715qe",
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "3227u",
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2820",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "430um",
         },
         {
            model: "xeon e5 2430l v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4860_v2",
         },
         {
            model: "xeon e5 1620 v4",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "celeron n",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "n2910",
         },
         {
            model: "pentium j",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "j2900",
         },
         {
            model: "xeon e3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "1585_v5",
         },
         {
            model: "xeon e3 1105c v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3 1265l v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8550u",
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "530",
         },
         {
            model: "xeon e5 2428l v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4809_v2",
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4160t",
         },
         {
            model: "atom c",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "c2308",
         },
         {
            model: "celeron j",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "j3060",
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "6157u",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2430m",
         },
         {
            model: "xeon platinum",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8160",
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8890_v3",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2500",
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "330m",
         },
         {
            model: "xeon e3 12201 v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "x3470",
         },
         {
            model: "xeon e3 1230",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2680",
         },
         {
            model: "xeon gold",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "6138t",
         },
         {
            model: "xeon gold",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "5118",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "540um",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "930",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4550u",
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8350k",
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2850_v2",
         },
         {
            model: "atom x3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "c3235rk",
         },
         {
            model: "enterprise linux desktop",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "6.0",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2390t",
         },
         {
            model: "xeon platinum",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8170",
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "350m",
         },
         {
            model: "atom c",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "c2538",
         },
         {
            model: "xeon",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "e5520",
         },
         {
            model: "xeon e5 2418l v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon platinum",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8176f",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "7700t",
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "390m",
         },
         {
            model: "xeon e3 1290 v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "330um",
         },
         {
            model: "celeron n",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "n2940",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2649m",
         },
         {
            model: "pentium n",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "n4200",
         },
         {
            model: "xeon silver",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4110",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2697_v2",
         },
         {
            model: "xeon",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "e5504",
         },
         {
            model: "xeon e3 1245 v5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "l5508",
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8870_v2",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "3820qm",
         },
         {
            model: "xeon e3 1280 v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3 1281 v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "enterprise linux eus",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "7.4",
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2100",
         },
         {
            model: "solidfire element os management node",
            scope: "eq",
            trust: 1,
            vendor: "netapp",
            version: null,
         },
         {
            model: "atom z",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "z2560",
         },
         {
            model: "xeon platinum",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8156",
         },
         {
            model: "xeon e3 1268l v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "celeron j",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "j3455",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2960xm",
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4850_v4",
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4020y",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "7820eq",
         },
         {
            model: "core m",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "5y51",
         },
         {
            model: "xeon",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "l5520",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "5300u",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2687w",
         },
         {
            model: "xeon e5 1660",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5 1680 v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "e5506",
         },
         {
            model: "xeon",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "e5649",
         },
         {
            model: "xeon e3 1275 v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4150t",
         },
         {
            model: "xeon gold",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "6130",
         },
         {
            model: "xeon e5 2420",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4820_v2",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4790",
         },
         {
            model: "xeon e3 1230 v6",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "660",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "6402p",
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4860",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4603_v2",
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8830",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "3330",
         },
         {
            model: "xeon e5 1428l",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "3470s",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2720qm",
         },
         {
            model: "xeon",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "ec5539",
         },
         {
            model: "xeon e5 1660 v4",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4800mq",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "3540m",
         },
         {
            model: "xeon e3 1505m v5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "celeron j",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "j1800",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4603",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "5675r",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4650",
         },
         {
            model: "atom c",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "c2350",
         },
         {
            model: "atom c",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "c2758",
         },
         {
            model: "atom c",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "c3338",
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "3225",
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2860",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4860hq",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "5775c",
         },
         {
            model: "pentium j",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "j3710",
         },
         {
            model: "pentium n",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "n3520",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "3439y",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "3570k",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "7y75",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4278u",
         },
         {
            model: "celeron n",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "n2820",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "3537u",
         },
         {
            model: "core m5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "6y57",
         },
         {
            model: "xeon e3 1271 v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3 1286 v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4820_v4",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8700",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4648_v3",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "5675c",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "480m",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "740qm",
         },
         {
            model: "core m3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "7y32",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4950hq",
         },
         {
            model: "xeon e3 1286l v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "enterprise linux server aus",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "7.4",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2657m",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8400",
         },
         {
            model: "xeon phi",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "7290",
         },
         {
            model: "atom z",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "z3530",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "610e",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "5700eq",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2620m",
         },
         {
            model: "xeon bronze 3104",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3 1230 v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3 1280 v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon gold",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "5119t",
         },
         {
            model: "xeon gold",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "6148f",
         },
         {
            model: "celeron n",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "n3150",
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "3110m",
         },
         {
            model: "xeon e3 1270 v6",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "620le",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "950",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2658a_v3",
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2328m",
         },
         {
            model: "xeon e5 2630",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3 1225 v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4620_v4",
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "560",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "661",
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "380um",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "650",
         },
         {
            model: "xeon gold",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "5120",
         },
         {
            model: "xeon e3 1240l v5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4130t",
         },
         {
            model: "xeon e5 2630 v4",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "3120m",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "3520m",
         },
         {
            model: "xeon",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "x5675",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4640_v3",
         },
         {
            model: "xeon e5 1428l v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5 2608l v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "cortex-a",
            scope: "eq",
            trust: 1,
            vendor: "arm",
            version: "15",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "5775r",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "7.0",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4640",
         },
         {
            model: "atom c",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "c3308",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2697_v3",
         },
         {
            model: "xeon",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "l5640",
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4150",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "7820hk",
         },
         {
            model: "xeon e3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "1565l_v5",
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8857_v2",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "6440hq",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2670_v2",
         },
         {
            model: "xeon e5 2620 v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2400",
         },
         {
            model: "xeon",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "l3426",
         },
         {
            model: "xeon e3 12201",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4308u",
         },
         {
            model: "xeon platinum",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8168",
         },
         {
            model: "atom c",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "c3758",
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4330",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "760",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2650l_v4",
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4830_v2",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4578u",
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8870_v4",
         },
         {
            model: "xeon e3 1505l v5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "940",
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4100e",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2540m",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4210u",
         },
         {
            model: "xeon e5 2418l v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon gold",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "5120t",
         },
         {
            model: "cortex-a",
            scope: "eq",
            trust: 1,
            vendor: "arm",
            version: "73",
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4870_v2",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4702ec",
         },
         {
            model: "celeron n",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "n2807",
         },
         {
            model: "atom c",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "c2730",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "3630qm",
         },
         {
            model: "xeon e5 2640 v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4770t",
         },
         {
            model: "atom c",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "c3958",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4765t",
         },
         {
            model: "atom c",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "c3508",
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8890_v2",
         },
         {
            model: "xeon e5 2608l v4",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "550",
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "3220t",
         },
         {
            model: "xeon silver",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4109t",
         },
         {
            model: "celeron n",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "n3010",
         },
         {
            model: "xeon e3 1285l v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4820_v3",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4690k",
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2105",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4510u",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2660_v4",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4770k",
         },
         {
            model: "xeon e3 1268l v5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "celeron n",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "n2815",
         },
         {
            model: "celeron n",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "n2808",
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "3217ue",
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "3250t",
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8100",
         },
         {
            model: "xeon e5 1650 v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "atom e",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "e3845",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4660_v4",
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "6167u",
         },
         {
            model: "m12-2",
            scope: "lt",
            trust: 1,
            vendor: "fujitsu",
            version: "xcp3090",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2515e",
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "5157u",
         },
         {
            model: "xeon gold",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "6138",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4610y",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "3337u",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "580m",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "750",
         },
         {
            model: "xeon e5 1428l v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "3240t",
         },
         {
            model: "xeon e5 2650l",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4910mq",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "3740qm",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4870hq",
         },
         {
            model: "atom z",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "z3785",
         },
         {
            model: "xeon e5 2630 v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4025u",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4430s",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2635qm",
         },
         {
            model: "xeon e3 1285 v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5 2630l v4",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "3229y",
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4102e",
         },
         {
            model: "xeon",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "x5667",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2690_v3",
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4820",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "3770t",
         },
         {
            model: "xeon e5 2628l v4",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8867_v4",
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4850",
         },
         {
            model: "xeon e3 1258l v4",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4302y",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "3339y",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4710hq",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8700k",
         },
         {
            model: "xeon",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "e5645",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8650u",
         },
         {
            model: "xeon e3 1220 v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon silver",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4116t",
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "3240",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2557m",
         },
         {
            model: "core m7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "6y75",
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "380m",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2450m",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "620lm",
         },
         {
            model: "xeon",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "l5506",
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8867_v3",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "6267u",
         },
         {
            model: "xeon",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "e7540",
         },
         {
            model: "xeon e3 1260l",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "3840qm",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "5250u",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2695_v2",
         },
         {
            model: "enterprise linux server tus",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "7.4",
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2357m",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4670k",
         },
         {
            model: "atom z",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "z2760",
         },
         {
            model: "xeon e3 1225 v5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "celeron n",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "n2930",
         },
         {
            model: "atom e",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "e3825",
         },
         {
            model: "xeon e3 1245 v6",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5 2609 v4",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5 2643",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2695_v4",
         },
         {
            model: "xeon e5 2448l",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "atom e",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "e3805",
         },
         {
            model: "xeon e5 2609 v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "atom z",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "z3580",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "6287u",
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8860_v3",
         },
         {
            model: "xeon e5 1660 v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "e6540",
         },
         {
            model: "xeon e3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "1535m_v6",
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "5020u",
         },
         {
            model: "atom c",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "c3955",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "870",
         },
         {
            model: "xeon e5 2403 v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5 2643 v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "communications eagle application processor",
            scope: "eq",
            trust: 1,
            vendor: "oracle",
            version: "16.1.0",
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4330te",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "6500te",
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4110e",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2667_v2",
         },
         {
            model: "xeon",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "x5647",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "920xm",
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "3120me",
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "5015u",
         },
         {
            model: "xeon e5 2407",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "6500",
         },
         {
            model: "xeon platinum",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8160m",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2537m",
         },
         {
            model: "xeon e3 1501l v6",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8893_v3",
         },
         {
            model: "enterprise linux server eus",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "7.6",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4220y",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4650l",
         },
         {
            model: "xeon",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "x7560",
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "6100te",
         },
         {
            model: "xeon",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "ec5549",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4650u",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "7700hq",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4300m",
         },
         {
            model: "atom e",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "e3826",
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "6100e",
         },
         {
            model: "xeon e5 2470",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4700ec",
         },
         {
            model: "celeron n",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "n2810",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "5850eq",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "5850hq",
         },
         {
            model: "atom z",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "z3770",
         },
         {
            model: "atom z",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "z3735g",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "540m",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4690",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "3770k",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "6500t",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2320",
         },
         {
            model: "atom c",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "c2530",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "3470",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "6400",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2600s",
         },
         {
            model: "atom z",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "z3480",
         },
         {
            model: "xeon e5 2650 v4",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core m",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "5y71",
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "3245",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "3570",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4410e",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "6685r",
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8880l_v2",
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4170",
         },
         {
            model: "xeon",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "x5560",
         },
         {
            model: "xeon",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "x5650",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "520e",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4667_v3",
         },
         {
            model: "celeron n",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "n3450",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "5575r",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2550k",
         },
         {
            model: "xeon e5 2430",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "atom z",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "z3736g",
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2803",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4600m",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4607_v2",
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2100t",
         },
         {
            model: "atom z",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "z3795",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4700mq",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4202y",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "7660u",
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "5005u",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2660_v2",
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8880_v2",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "3612qe",
         },
         {
            model: "xeon",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "x5672",
         },
         {
            model: "xeon e5 2430 v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4250u",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "7920hq",
         },
         {
            model: "xeon e3 1245",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "3437u",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2658_v4",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4720hq",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2658_v2",
         },
         {
            model: "xeon e5 2650l v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2310m",
         },
         {
            model: "atom c",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "c2518",
         },
         {
            model: "celeron j",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "j1900",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2310",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2699a_v4",
         },
         {
            model: "xeon e5 2603 v4",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5 2628l v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3 1278l v4",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon platinum",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8160f",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4702hq",
         },
         {
            model: "xeon e5 2620",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon gold",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "6144",
         },
         {
            model: "atom x3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "c3200rk",
         },
         {
            model: "xeon e3 1240 v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "communications lsms",
            scope: "lte",
            trust: 1,
            vendor: "oracle",
            version: "13.3",
         },
         {
            model: "core m5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "6y54",
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "3210",
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4350t",
         },
         {
            model: "xeon phi",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "7210f",
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "3130m",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "3615qm",
         },
         {
            model: "core m",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "5y10a",
         },
         {
            model: "xeon",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "x5570",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "870s",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2405s",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "3550s",
         },
         {
            model: "xeon",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "x5660",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4640_v4",
         },
         {
            model: "xeon e5 2643 v4",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4010y",
         },
         {
            model: "xeon platinum",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8153",
         },
         {
            model: "atom x3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "c3130",
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4830_v4",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "3689y",
         },
         {
            model: "xeon e3 1270",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2680_v3",
         },
         {
            model: "atom c",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "c3708",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "840qm",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4610_v4",
         },
         {
            model: "xeon e3 1245 v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5 2408l v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "atom c",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "c2358",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2710qe",
         },
         {
            model: "pentium n",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "n3540",
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8891_v4",
         },
         {
            model: "cortex-a",
            scope: "eq",
            trust: 1,
            vendor: "arm",
            version: "57",
         },
         {
            model: "xeon e5 2428l v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5 2650l v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "6100t",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "560m",
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2375m",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4200h",
         },
         {
            model: "xeon",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "x7542",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4620",
         },
         {
            model: "xeon e5 2640",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4810mq",
         },
         {
            model: "celeron n",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "n2920",
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4830",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4210h",
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4340",
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "370m",
         },
         {
            model: "xeon e5 1680 v4",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4112e",
         },
         {
            model: "celeron n",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "n3060",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2697a_v4",
         },
         {
            model: "xeon gold",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "6152",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "680",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "5350h",
         },
         {
            model: "xeon e3 1220l v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4607",
         },
         {
            model: "atom z",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "z3745",
         },
         {
            model: "xeon e5 2428l",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "e5640",
         },
         {
            model: "xeon e5 2637 v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2677m",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "5500u",
         },
         {
            model: "xeon e3 1240 v6",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4617",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4667_v4",
         },
         {
            model: "xeon e3 1275 v6",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3 1225",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "6600k",
         },
         {
            model: "xeon e3 1275l v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "975",
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4000m",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "920",
         },
         {
            model: "xeon e5 2637 v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8893_v2",
         },
         {
            model: "xeon",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "x3450",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "3610qm",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2680_v2",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4402e",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "6600",
         },
         {
            model: "xeon e5 2650 v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon platinum",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8164",
         },
         {
            model: "xeon",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "l5530",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2697_v4",
         },
         {
            model: "atom c",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "c3808",
         },
         {
            model: "xeon platinum",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8158",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4460t",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4260u",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4650_v2",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "6360u",
         },
         {
            model: "xeon e3 1220 v5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2683_v3",
         },
         {
            model: "atom c",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "c3538",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2760qm",
         },
         {
            model: "pentium n",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "n3710",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2300",
         },
         {
            model: "atom z",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "z3775",
         },
         {
            model: "atom c",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "c2508",
         },
         {
            model: "xeon phi",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "7235",
         },
         {
            model: "xeon",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "w3670",
         },
         {
            model: "xeon silver",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4114",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4690s",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4710mq",
         },
         {
            model: "atom z",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "z3735e",
         },
         {
            model: "enterprise linux server aus",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "7.6",
         },
         {
            model: "xeon platinum",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8170m",
         },
         {
            model: "xeon",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "x5680",
         },
         {
            model: "atom z",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "z2460",
         },
         {
            model: "xeon e5 2620 v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8860_v4",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "3610me",
         },
         {
            model: "xeon gold",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "6130t",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "3475s",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8600k",
         },
         {
            model: "atom z",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "z3775d",
         },
         {
            model: "xeon e3 1125c",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4005u",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2610ue",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "7820hq",
         },
         {
            model: "communications eagle application processor",
            scope: "eq",
            trust: 1,
            vendor: "oracle",
            version: "16.2.0",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "3517ue",
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2870_v2",
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4330t",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4210y",
         },
         {
            model: "xeon e5 2648l v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3 1275",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2700k",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4600u",
         },
         {
            model: "xeon e5 1650 v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5 2450 v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4310u",
         },
         {
            model: "cortex-a",
            scope: "eq",
            trust: 1,
            vendor: "arm",
            version: "75",
         },
         {
            model: "xeon gold",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "6138f",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "860s",
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "3115c",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "660lm",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4785t",
         },
         {
            model: "xeon e3 1230l v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8870",
         },
         {
            model: "xeon e3 1270 v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4288u",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2637m",
         },
         {
            model: "atom z",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "z3570",
         },
         {
            model: "atom c",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "c2316",
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2125",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "3330s",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4590t",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "6600t",
         },
         {
            model: "core m",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "5y70",
         },
         {
            model: "xeon",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "l5609",
         },
         {
            model: "xeon e5 2609",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5 2630 v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5 2630l v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "1558l_v5",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2629m",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "5600u",
         },
         {
            model: "xeon bronze 3106",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "980x",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4760hq",
         },
         {
            model: "atom z",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "z3770d",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "460m",
         },
         {
            model: "celeron j",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "j3355",
         },
         {
            model: "xeon gold",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "6126t",
         },
         {
            model: "atom z",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "z3590",
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4350",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "5700hq",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2600k",
         },
         {
            model: "atom c",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "c2516",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4210m",
         },
         {
            model: "xeon",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "x5677",
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4110m",
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8890_v4",
         },
         {
            model: "m12-1",
            scope: "lt",
            trust: 1,
            vendor: "fujitsu",
            version: "xcp3090",
         },
         {
            model: "xeon",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "e5502",
         },
         {
            model: "xeon",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "e5620",
         },
         {
            model: "xeon e5 2440 v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon gold",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "6128",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "3210m",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4770r",
         },
         {
            model: "xeon platinum",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8176",
         },
         {
            model: "atom c",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "c3858",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4650_v4",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "6300hq",
         },
         {
            model: "xeon",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "e5606",
         },
         {
            model: "atom z",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "z2580",
         },
         {
            model: "xeon e5 2623 v4",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4500u",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4770te",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "3615qe",
         },
         {
            model: "xeon e3 1290",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core m",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "5y31",
         },
         {
            model: "cortex-a",
            scope: "eq",
            trust: 1,
            vendor: "arm",
            version: "9",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "7560u",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "5950hq",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2698_v3",
         },
         {
            model: "pentium j",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "j4205",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "640lm",
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2880_v2",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2667_v4",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4200u",
         },
         {
            model: "xeon",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "w5590",
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4170t",
         },
         {
            model: "xeon e5 2450l v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "3360m",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4310m",
         },
         {
            model: "atom c",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "c3558",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "450m",
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "6300",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4700hq",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4628l_v4",
         },
         {
            model: "xeon e5 1620 v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2870",
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8894_v4",
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2130",
         },
         {
            model: "xeon e3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "1545m_v5",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4610_v2",
         },
         {
            model: "xeon gold",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "6140m",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2630qm",
         },
         {
            model: "xeon e3 1240 v5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5 2637 v4",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2102",
         },
         {
            model: "atom c",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "c2750",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4590s",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2510e",
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "6320",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2860qm",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4660_v3",
         },
         {
            model: "atom x3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "c3205rk",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "7700k",
         },
         {
            model: "xeon",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "e7520",
         },
         {
            model: "celeron n",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "n4000",
         },
         {
            model: "core m",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "5y10c",
         },
         {
            model: "pentium n",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "n3530",
         },
         {
            model: "struxureware data center expert",
            scope: "eq",
            trust: 1,
            vendor: "schneider electric",
            version: "7.6.0",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4430",
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4030y",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2675qm",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "7700",
         },
         {
            model: "xeon e3 1285 v4",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2600",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2660_v3",
         },
         {
            model: "xeon e5 2630l",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8850",
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4890_v2",
         },
         {
            model: "xeon gold",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "5115",
         },
         {
            model: "xeon e3 1231 v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "3450s",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2467m",
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "6100",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2450p",
         },
         {
            model: "xeon",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "l5630",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "3570s",
         },
         {
            model: "atom z",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "z3736f",
         },
         {
            model: "xeon e5 2603",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "7600u",
         },
         {
            model: "xeon",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "lc5518",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "3470t",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "3517u",
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8870_v3",
         },
         {
            model: "xeon phi",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "7290f",
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "6006u",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "5350u",
         },
         {
            model: "xeon e5 2650",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2670",
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4370",
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2120t",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2683_v4",
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4850_v2",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4712hq",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "5650u",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "5257u",
         },
         {
            model: "xeon gold",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "6142",
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4100u",
         },
         {
            model: "xeon phi",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "7230",
         },
         {
            model: "enterprise linux server tus",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "7.6",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2670_v3",
         },
         {
            model: "celeron n",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "n2830",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4790k",
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "3250",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "660ue",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "6585r",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "620um",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8350u",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "990x",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4770s",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2665",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "750s",
         },
         {
            model: "xeon platinum",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8176m",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "5550u",
         },
         {
            model: "xeon gold",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "6132",
         },
         {
            model: "xeon e3 1280",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5 2450l",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4340te",
         },
         {
            model: "enterprise linux server",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "7.0",
         },
         {
            model: "celeron j",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "j4105",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4590",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "3555le",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2667_v3",
         },
         {
            model: "xeon",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "x3440",
         },
         {
            model: "celeron n",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "n2840",
         },
         {
            model: "xeon gold",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "6126",
         },
         {
            model: "xeon e3 1125c v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3 1225 v6",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3 1275 v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2330e",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4669_v3",
         },
         {
            model: "xeon",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "l3406",
         },
         {
            model: "xeon e3 1505l v6",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "atom c",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "c3950",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "430m",
         },
         {
            model: "atom z",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "z2520",
         },
         {
            model: "xeon",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "x3430",
         },
         {
            model: "xeon e3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "1578l_v5",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4200m",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4570s",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2699r_v4",
         },
         {
            model: "xeon e5 2628l v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "e5603",
         },
         {
            model: "xeon silver",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4108",
         },
         {
            model: "cortex-r",
            scope: "eq",
            trust: 1,
            vendor: "arm",
            version: "8",
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "540",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4670s",
         },
         {
            model: "xeon e5 1630 v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon silver",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4116",
         },
         {
            model: "atom c",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "c3750",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2500k",
         },
         {
            model: "xeon",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "e5530",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "3635qm",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2658",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4670t",
         },
         {
            model: "atom z",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "z3560",
         },
         {
            model: "celeron n",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "n3050",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "720qm",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "3340",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "3340m",
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "6100h",
         },
         {
            model: "atom c",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "c2738",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "6442eq",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4790s",
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2377m",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "880",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "7500u",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "860",
         },
         {
            model: "pentium n",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "n3510",
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2310e",
         },
         {
            model: "atom e",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "e3815",
         },
         {
            model: "xeon e5 2648l v4",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "atom z",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "z2420",
         },
         {
            model: "atom x3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "c3295rk",
         },
         {
            model: "celeron n",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "n2805",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "470um",
         },
         {
            model: "xeon e5 1620",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5 2640 v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2410m",
         },
         {
            model: "cortex-a",
            scope: "eq",
            trust: 1,
            vendor: "arm",
            version: "17",
         },
         {
            model: "xeon e3 1235l v5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "520um",
         },
         {
            model: "xeon e5 2643 v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "x5670",
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8891_v2",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4440",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "3720qm",
         },
         {
            model: "xeon",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "e7530",
         },
         {
            model: "xeon e3 1240",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3 1220 v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2120",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4400e",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "3770s",
         },
         {
            model: "xeon e5 2648l",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4030u",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4340m",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2687w_v4",
         },
         {
            model: "xeon e5 1650 v4",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3 1235",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5 2430l",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2400s",
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4880_v2",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "6300u",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "5200u",
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8837",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "5557u",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4750hq",
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "6098p",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2690_v2",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4624l_v2",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "520m",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "3320m",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4558u",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "3427u",
         },
         {
            model: "pentium j",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "j2850",
         },
         {
            model: "xeon e3 1270 v5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "celeron j",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "j3160",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "6260u",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2660",
         },
         {
            model: "xeon",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "x5690",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2698_v4",
         },
         {
            model: "xeon e5 2450",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5 2438l v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4258u",
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2330m",
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4010u",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4570t",
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8850_v2",
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4850_v3",
         },
         {
            model: "xeon phi",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "7230f",
         },
         {
            model: "xeon e5 2630l v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4460",
         },
         {
            model: "xeon e3 1265l v4",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon phi",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "7295",
         },
         {
            model: "enterprise linux server",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "6.0",
         },
         {
            model: "xeon",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "x3460",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "7567u",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4640_v2",
         },
         {
            model: "xeon",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "x3480",
         },
         {
            model: "xeon",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "w3690",
         },
         {
            model: "atom x3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "c3265rk",
         },
         {
            model: "xeon e3 1280 v6",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "e5607",
         },
         {
            model: "xeon e5 2623 v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2680_v4",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "940xm",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4650_v3",
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2340ue",
         },
         {
            model: "xeon gold",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "6134m",
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "5010u",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4620_v2",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4300u",
         },
         {
            model: "xeon e3 1220",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4100m",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4770",
         },
         {
            model: "xeon gold",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "6126f",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "3550",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "3610qe",
         },
         {
            model: "xeon silver",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4112",
         },
         {
            model: "xeon e3 1265l v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "atom z",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "z2480",
         },
         {
            model: "atom z",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "z3735f",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2500s",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2667",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "3570t",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2670qm",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2699_v3",
         },
         {
            model: "xeon e3 1240l v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "atom c",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "c2550",
         },
         {
            model: "xeon",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "e5507",
         },
         {
            model: "atom z",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "z3740d",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4620_v3",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "660um",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4850hq",
         },
         {
            model: "xeon e5 2603 v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2920xm",
         },
         {
            model: "xeon e5 2609 v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3 1245 v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "atom c",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "c3830",
         },
         {
            model: "atom z",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "z3735d",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "3632qm",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2658_v3",
         },
         {
            model: "xeon phi",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "7285",
         },
         {
            model: "communications lsms",
            scope: "gte",
            trust: 1,
            vendor: "oracle",
            version: "13.1",
         },
         {
            model: "xeon e5 2420 v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4570te",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "6440eq",
         },
         {
            model: "xeon e5 1630 v4",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8880_v3",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2500t",
         },
         {
            model: "xeon e3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "1515m_v5",
         },
         {
            model: "cortex-a",
            scope: "eq",
            trust: 1,
            vendor: "arm",
            version: "8",
         },
         {
            model: "xeon gold",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "6150",
         },
         {
            model: "xeon",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "lc5528",
         },
         {
            model: "xeon e3 1220 v6",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5 2650 v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5 1620 v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "655k",
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4370t",
         },
         {
            model: "cortex-r",
            scope: "eq",
            trust: 1,
            vendor: "arm",
            version: "7",
         },
         {
            model: "atom x3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "c3230rk",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4200y",
         },
         {
            model: "xeon",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "l7545",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4440s",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4570",
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8893_v4",
         },
         {
            model: "cortex-a",
            scope: "eq",
            trust: 1,
            vendor: "arm",
            version: "72",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4700eq",
         },
         {
            model: "xeon",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "x7550",
         },
         {
            model: "atom c",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "c2558",
         },
         {
            model: "xeon e3 1275 v5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5 2637",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon phi",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "7250f",
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2830",
         },
         {
            model: "xeon e3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "1505m_v6",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4610_v3",
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "3217u",
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2365m",
         },
         {
            model: "pentium n",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "n3700",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "620m",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4770hq",
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2370m",
         },
         {
            model: "xeon e3 1246 v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4402ec",
         },
         {
            model: "xeon gold",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "6142f",
         },
         {
            model: "enterprise linux workstation",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "7.0",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4655_v3",
         },
         {
            model: "atom z",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "z3745d",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "620ue",
         },
         {
            model: "atom c",
            scope: null,
            trust: 0.8,
            vendor: "intel",
            version: null,
         },
         {
            model: "atom e",
            scope: null,
            trust: 0.8,
            vendor: "intel",
            version: null,
         },
         {
            model: "atom x3",
            scope: null,
            trust: 0.8,
            vendor: "intel",
            version: null,
         },
         {
            model: "atom z",
            scope: null,
            trust: 0.8,
            vendor: "intel",
            version: null,
         },
         {
            model: "celeron j",
            scope: null,
            trust: 0.8,
            vendor: "intel",
            version: null,
         },
         {
            model: "celeron n",
            scope: null,
            trust: 0.8,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3",
            scope: "eq",
            trust: 0.6,
            vendor: "intel",
            version: "1231_v3",
         },
         {
            model: "xeon e3",
            scope: "eq",
            trust: 0.6,
            vendor: "intel",
            version: "1220l_v2",
         },
         {
            model: "linux enterprise server sp3",
            scope: "eq",
            trust: 0.3,
            vendor: "suse",
            version: "12",
         },
         {
            model: "linux enterprise server sp4",
            scope: "eq",
            trust: 0.3,
            vendor: "suse",
            version: "11",
         },
         {
            model: "virtualization host",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "4",
         },
         {
            model: "enterprise linux workstation",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "7",
         },
         {
            model: "enterprise linux workstation",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "6",
         },
         {
            model: "enterprise linux server update services for sap solutions",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "-7.6",
         },
         {
            model: "enterprise linux server tus",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "-7.6",
         },
         {
            model: "enterprise linux server extended update support",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "-7.6",
         },
         {
            model: "enterprise linux server extended update support",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "-7.5",
         },
         {
            model: "enterprise linux server aus",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "-7.6",
         },
         {
            model: "enterprise linux server update services for sap solutions",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "-7.",
         },
         {
            model: "enterprise linux server",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "7",
         },
         {
            model: "enterprise linux server",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "6",
         },
         {
            model: "enterprise linux for scientific computing",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "7",
         },
         {
            model: "enterprise linux for scientific computing",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "6",
         },
         {
            model: "enterprise linux for real time",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "7",
         },
         {
            model: "enterprise linux for power little endian extended update supp",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "-7.6",
         },
         {
            model: "enterprise linux for power little endian extended update supp",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "-7.5",
         },
         {
            model: "enterprise linux for power little endian",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "7",
         },
         {
            model: "enterprise linux for power big endian extended update support",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "-7.6",
         },
         {
            model: "enterprise linux for power big endian extended update support",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "-7.5",
         },
         {
            model: "enterprise linux for power big endian",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "7",
         },
         {
            model: "enterprise linux for power big endian",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "6",
         },
         {
            model: "enterprise linux for power",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "97",
         },
         {
            model: "enterprise linux for ibm z systems extended update support",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "-7.6",
         },
         {
            model: "enterprise linux for ibm z systems extended update support",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "-7.5",
         },
         {
            model: "enterprise linux for ibm z systems",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "7",
         },
         {
            model: "enterprise linux for ibm z systems",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "6",
         },
         {
            model: "enterprise linux for ibm system z",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "7",
         },
         {
            model: "enterprise linux for arm",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "647",
         },
         {
            model: "enterprise linux eus compute node",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "7.6",
         },
         {
            model: "enterprise linux eus compute node",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "7.5",
         },
         {
            model: "enterprise linux desktop",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "7",
         },
         {
            model: "enterprise linux desktop",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "6",
         },
         {
            model: "communications eagle application processor",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "16.2",
         },
         {
            model: "communications eagle application processor",
            scope: "eq",
            trust: 0.3,
            vendor: "oracle",
            version: "16.1",
         },
         {
            model: "solidfire element os management node",
            scope: "eq",
            trust: 0.3,
            vendor: "netapp",
            version: "0",
         },
         {
            model: "xeon w processor",
            scope: "eq",
            trust: 0.3,
            vendor: "intel",
            version: "0",
         },
         {
            model: "xeon scalable processors",
            scope: "eq",
            trust: 0.3,
            vendor: "intel",
            version: "0",
         },
         {
            model: "xeon processor e7 family",
            scope: "eq",
            trust: 0.3,
            vendor: "intel",
            version: "v40",
         },
         {
            model: "xeon processor e7 family",
            scope: "eq",
            trust: 0.3,
            vendor: "intel",
            version: "v30",
         },
         {
            model: "xeon processor e7 family",
            scope: "eq",
            trust: 0.3,
            vendor: "intel",
            version: "v20",
         },
         {
            model: "xeon processor e7 family",
            scope: "eq",
            trust: 0.3,
            vendor: "intel",
            version: "0",
         },
         {
            model: "xeon processor e5 family",
            scope: "eq",
            trust: 0.3,
            vendor: "intel",
            version: "v40",
         },
         {
            model: "xeon processor e5 family",
            scope: "eq",
            trust: 0.3,
            vendor: "intel",
            version: "v30",
         },
         {
            model: "xeon processor e5 family",
            scope: "eq",
            trust: 0.3,
            vendor: "intel",
            version: "v20",
         },
         {
            model: "xeon processor e5 family",
            scope: "eq",
            trust: 0.3,
            vendor: "intel",
            version: "0",
         },
         {
            model: "xeon processor e3 family",
            scope: "eq",
            trust: 0.3,
            vendor: "intel",
            version: "v60",
         },
         {
            model: "xeon processor e3 family",
            scope: "eq",
            trust: 0.3,
            vendor: "intel",
            version: "v50",
         },
         {
            model: "xeon processor e3 family",
            scope: "eq",
            trust: 0.3,
            vendor: "intel",
            version: "v40",
         },
         {
            model: "xeon processor e3 family",
            scope: "eq",
            trust: 0.3,
            vendor: "intel",
            version: "v30",
         },
         {
            model: "xeon processor e3 family",
            scope: "eq",
            trust: 0.3,
            vendor: "intel",
            version: "v20",
         },
         {
            model: "xeon processor e3 family",
            scope: "eq",
            trust: 0.3,
            vendor: "intel",
            version: "0",
         },
         {
            model: "xeon e processor",
            scope: "eq",
            trust: 0.3,
            vendor: "intel",
            version: "0",
         },
         {
            model: "pentium silver processor series",
            scope: "eq",
            trust: 0.3,
            vendor: "intel",
            version: "0",
         },
         {
            model: "pentium processor n series",
            scope: "eq",
            trust: 0.3,
            vendor: "intel",
            version: "0",
         },
         {
            model: "pentium processor j series",
            scope: "eq",
            trust: 0.3,
            vendor: "intel",
            version: "0",
         },
         {
            model: "legacy xeon processors",
            scope: "eq",
            trust: 0.3,
            vendor: "intel",
            version: "0",
         },
         {
            model: "core x-series processors",
            scope: "eq",
            trust: 0.3,
            vendor: "intel",
            version: "0",
         },
         {
            model: "celeron processor n series",
            scope: "eq",
            trust: 0.3,
            vendor: "intel",
            version: "0",
         },
         {
            model: "celeron processor j series",
            scope: "eq",
            trust: 0.3,
            vendor: "intel",
            version: "0",
         },
         {
            model: "celeron processor g series",
            scope: "eq",
            trust: 0.3,
            vendor: "intel",
            version: "0",
         },
         {
            model: "celeron processor series",
            scope: "eq",
            trust: 0.3,
            vendor: "intel",
            version: "30000",
         },
         {
            model: "celeron processor series",
            scope: "eq",
            trust: 0.3,
            vendor: "intel",
            version: "20000",
         },
         {
            model: "celeron processor series",
            scope: "eq",
            trust: 0.3,
            vendor: "intel",
            version: "10000",
         },
         {
            model: "atom processor z series",
            scope: "eq",
            trust: 0.3,
            vendor: "intel",
            version: "0",
         },
         {
            model: "atom processor series",
            scope: "eq",
            trust: 0.3,
            vendor: "intel",
            version: "x0",
         },
         {
            model: "atom processor s series",
            scope: "eq",
            trust: 0.3,
            vendor: "intel",
            version: "0",
         },
         {
            model: "atom processor n series",
            scope: "eq",
            trust: 0.3,
            vendor: "intel",
            version: "0",
         },
         {
            model: "atom processor e series",
            scope: "eq",
            trust: 0.3,
            vendor: "intel",
            version: "0",
         },
         {
            model: "atom processor d series",
            scope: "eq",
            trust: 0.3,
            vendor: "intel",
            version: "0",
         },
         {
            model: "atom processor c series",
            scope: "eq",
            trust: 0.3,
            vendor: "intel",
            version: "0",
         },
         {
            model: "9th generation core i9 processors",
            scope: "eq",
            trust: 0.3,
            vendor: "intel",
            version: "0",
         },
         {
            model: "9th generation core i7 processors",
            scope: "eq",
            trust: 0.3,
            vendor: "intel",
            version: "0",
         },
         {
            model: "9th generation core i5 processors",
            scope: "eq",
            trust: 0.3,
            vendor: "intel",
            version: "0",
         },
         {
            model: "8th generation core m processors",
            scope: "eq",
            trust: 0.3,
            vendor: "intel",
            version: "0",
         },
         {
            model: "8th generation core i9 processors",
            scope: "eq",
            trust: 0.3,
            vendor: "intel",
            version: "0",
         },
         {
            model: "8th generation core i7 processors",
            scope: "eq",
            trust: 0.3,
            vendor: "intel",
            version: "0",
         },
         {
            model: "8th generation core i5 processors",
            scope: "eq",
            trust: 0.3,
            vendor: "intel",
            version: "0",
         },
         {
            model: "8th generation core i3 processors",
            scope: "eq",
            trust: 0.3,
            vendor: "intel",
            version: "0",
         },
         {
            model: "7th generation core m processors",
            scope: "eq",
            trust: 0.3,
            vendor: "intel",
            version: "0",
         },
         {
            model: "7th generation core i7 processors",
            scope: "eq",
            trust: 0.3,
            vendor: "intel",
            version: "0",
         },
         {
            model: "7th generation core i5 processors",
            scope: "eq",
            trust: 0.3,
            vendor: "intel",
            version: "0",
         },
         {
            model: "7th generation core i3 processors",
            scope: "eq",
            trust: 0.3,
            vendor: "intel",
            version: "0",
         },
         {
            model: "6th generation core m processors",
            scope: "eq",
            trust: 0.3,
            vendor: "intel",
            version: "0",
         },
         {
            model: "6th generation core i7 processors",
            scope: "eq",
            trust: 0.3,
            vendor: "intel",
            version: "0",
         },
         {
            model: "6th generation core i5 processors",
            scope: "eq",
            trust: 0.3,
            vendor: "intel",
            version: "0",
         },
         {
            model: "6th generation core i3 processors",
            scope: "eq",
            trust: 0.3,
            vendor: "intel",
            version: "0",
         },
         {
            model: "5th generation core m processors",
            scope: "eq",
            trust: 0.3,
            vendor: "intel",
            version: "0",
         },
         {
            model: "5th generation core i7 processors",
            scope: "eq",
            trust: 0.3,
            vendor: "intel",
            version: "0",
         },
         {
            model: "5th generation core i5 processors",
            scope: "eq",
            trust: 0.3,
            vendor: "intel",
            version: "0",
         },
         {
            model: "5th generation core i3 processors",
            scope: "eq",
            trust: 0.3,
            vendor: "intel",
            version: "0",
         },
         {
            model: "4th generation core i7 processors",
            scope: "eq",
            trust: 0.3,
            vendor: "intel",
            version: "0",
         },
         {
            model: "4th generation core i5 processors",
            scope: "eq",
            trust: 0.3,
            vendor: "intel",
            version: "0",
         },
         {
            model: "4th generation core i3 processors",
            scope: "eq",
            trust: 0.3,
            vendor: "intel",
            version: "0",
         },
         {
            model: "security identity governance and intelligence",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2.4",
         },
         {
            model: "security identity governance and intelligence",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2.3",
         },
         {
            model: "security identity governance and intelligence",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2.2",
         },
         {
            model: "security identity governance and intelligence",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2.1",
         },
         {
            model: "security identity governance and intelligence",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2.4.1",
         },
         {
            model: "security identity governance and intelligence",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2.3.2",
         },
         {
            model: "security identity governance and intelligence",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2.3.1",
         },
         {
            model: "security identity governance and intelligence",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2.2.1",
         },
         {
            model: "security identity governance and intelligence",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "5.2",
         },
         {
            model: "qradar siem patch",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.3.16",
         },
         {
            model: "qradar siem",
            scope: "eq",
            trust: 0.3,
            vendor: "ibm",
            version: "7.3",
         },
         {
            model: "cortex a57",
            scope: "eq",
            trust: 0.3,
            vendor: "arm",
            version: "0",
         },
         {
            model: "pro",
            scope: "eq",
            trust: 0.3,
            vendor: "amd",
            version: "0",
         },
      ],
      sources: [
         {
            db: "BID",
            id: "108004",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2018-005796",
         },
         {
            db: "NVD",
            id: "CVE-2018-3693",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201807-884",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:h:intel:atom_c:c2316:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:atom_c:c2350:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:atom_c:c2550:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:atom_c:c2718:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:atom_c:c3308:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:atom_c:c3508:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:atom_c:c3830:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:atom_c:c3858:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:atom_c:c2358:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:atom_c:c2508:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:atom_c:c2516:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:atom_c:c2518:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:atom_c:c2530:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:atom_c:c3558:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:atom_c:c3708:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:atom_c:c3750:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:atom_c:c3758:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:atom_c:c2730:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:atom_c:c2738:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:atom_c:c2750:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:atom_c:c2758:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:atom_c:c3955:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:atom_c:c3958:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:atom_c:c2308:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:atom_c:c2338:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:atom_c:c2538:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:atom_c:c2558:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:atom_c:c3338:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:atom_c:c3538:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:atom_c:c3808:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:atom_c:c3850:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:atom_c:c3950:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:h:intel:atom_e:e3845:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:atom_e:e3826:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:atom_e:e3815:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:atom_e:e3827:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:atom_e:e3805:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:atom_e:e3825:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:h:intel:atom_x3:c3205rk:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:atom_x3:c3235rk:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:atom_x3:c3265rk:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:atom_x3:c3295rk:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:atom_x3:c3445:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:atom_x3:c3405:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:atom_x3:c3130:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:atom_x3:c3200rk:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:atom_x3:c3230rk:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:h:intel:atom_z:z2420:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:atom_z:z2460:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:atom_z:z2480:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:atom_z:z2520:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:atom_z:z3735f:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:atom_z:z3735g:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:atom_z:z3736f:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:atom_z:z3736g:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:atom_z:z3740:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:atom_z:z2580:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:atom_z:z3460:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:atom_z:z3580:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:atom_z:z3735d:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:atom_z:z3740d:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:atom_z:z3745d:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:atom_z:z3480:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:atom_z:z3530:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:atom_z:z3560:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:atom_z:z3570:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:atom_z:z3770d:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:atom_z:z3775:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:atom_z:z3775d:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:atom_z:z3785:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:atom_z:z2560:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:atom_z:z2760:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:atom_z:z3590:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:atom_z:z3735e:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:atom_z:z3745:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:atom_z:z3770:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:atom_z:z3795:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_j:j1850:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_j:j1900:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_j:j3060:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_j:j3160:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_j:j1800:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_j:j3355:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_j:j4005:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_j:j1750:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_j:j3455:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_j:j4105:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_n:n2840:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_n:n2910:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_n:n2920:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_n:n2930:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_n:n2810:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_n:n2820:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_n:n3000:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_n:n3050:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_n:n3450:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_n:n4100:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_n:n2805:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_n:n2806:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_n:n2807:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_n:n2808:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_n:n3060:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_n:n3150:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_n:n3160:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_n:n3350:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_n:n2815:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_n:n2830:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_n:n2940:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_n:n3010:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_n:n4000:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:330e:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:330m:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:330um:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:350m:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:370m:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:2120:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:2120t:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:2125:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:2130:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:2375m:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:2377m:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:3110m:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:3115c:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:3245:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:3250:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:3250t:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:4000m:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:4110e:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:4110m:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:4112e:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:4120u:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:4130:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:4340te:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:4350:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:380m:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:390m:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:2102:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:2115c:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:2310e:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:2312m:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:2330e:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:2357m:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:2367m:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:3120me:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:3210:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:3225:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:3229y:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:3240t:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:4005u:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:4010y:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:4100m:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:4102e:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:4150:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:4158u:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:4330:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:4330te:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:4370:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:5005u:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:6100:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:6100h:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:6157u:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:6300:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:4350t:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:4360:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:6100t:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:6100te:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:6100u:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:6102e:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:540:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:550:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:560:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:2100:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:2330m:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:2340ue:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:2348m:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:2350m:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:3217u:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:3217ue:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:3220:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:3220t:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:4020y:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:4025u:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:4030u:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:4030y:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:4160:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:4160t:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:4170:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:4170t:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:5010u:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:5015u:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:5020u:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:5157u:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:6006u:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:6320:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:8100:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:8350k:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:380um:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:530:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:2100t:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:2105:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:2310m:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:2328m:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:2365m:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:2370m:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:3120m:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:3130m:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:3227u:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:3240:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:4010u:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:4012y:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:4100e:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:4100u:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:4130t:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:4150t:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:4330t:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:4340:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:4360t:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:4370t:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:6098p:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:6100e:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:6167u:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3:6300t:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:450m:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:460m:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:470um:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:480m:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:520e:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:680:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:750:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:750s:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:760:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:2467m:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:2500:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:2500k:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:2500s:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:3330s:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:3337u:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:3339y:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:3340:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:3470t:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:3475s:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:3550:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:3550s:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:4210y:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:4220y:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:4250u:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:4258u:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:4360u:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:4400e:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:4402e:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:4402ec:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:4570t:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:4570te:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:4590:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:4590s:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:4590t:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:5287u:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:5300u:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:5350h:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:5350u:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:6402p:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:6440eq:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:6440hq:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:6442eq:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:430um:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:520um:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:540um:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:655k:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:661:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:2310:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:2380p:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:2435m:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:2450p:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:2500t:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:2515e:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:3230m:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:3320m:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:3340s:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:3360m:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:3450:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:3470:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:3570k:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:3570t:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:4210h:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:4210u:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:4260u:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:4288u:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:4310u:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:4340m:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:4422e:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:4430s:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:4460t:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:4570r:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:4670:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:4670r:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:5200u:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:5257u:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:5575r:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:5675r:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:6350hq:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:6400:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:6500t:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:6585r:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:8250u:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:8400:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:560m:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:560um:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:580m:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:650:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:2400:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:2400s:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:2405s:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:2410m:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:2537m:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:2540m:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:2550k:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:2557m:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:3380m:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:3427u:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:3437u:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:3439y:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:4200h:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:4200m:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:4200u:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:4200y:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:4300u:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:4300y:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:4302y:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:4308u:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:4310m:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:4440:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:4440s:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:4460:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:4460s:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:4670t:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:4690:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:4690k:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:4690s:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:6260u:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:6267u:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:6287u:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:6300hq:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:6300u:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:6600:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:6600k:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:6600t:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:6685r:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:430m:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:520m:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:540m:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:660:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:670:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:2300:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:2320:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:2390t:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:2430m:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:2450m:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:2510e:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:2520m:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:3210m:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:3317u:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:3330:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:3340m:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:3350p:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:3450s:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:3470s:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:3570:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:3570s:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:3610me:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:4202y:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:4210m:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:4278u:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:4300m:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:4330m:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:4350u:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:4410e:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:4430:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:4570:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:4570s:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:4670k:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:4670s:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:4690t:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:5250u:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:5675c:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:6200u:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:6360u:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:6400t:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:6500:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:6500te:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:8350u:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5:8600k:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:7y75:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:2630qm:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:2675qm:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:2700k:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:2920xm:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:3517u:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:3555le:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:3610qm:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:3635qm:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:3687u:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:3770t:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:3840qm:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:4578u:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:4600u:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:4700mq:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:4702hq:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:4722hq:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:4760hq:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:4770r:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:4770t:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:4771:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:4790t:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:4810mq:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:4960hq:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:5500u:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:5700eq:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:5750hq:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:5775r:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:7560u:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:7600u:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:7820hk:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:7920hq:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:610e:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:620lm:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:620ue:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:2640m:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:2649m:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:2655le:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:2657m:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:3517ue:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:3520m:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:3537u:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:3540m:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:3720qm:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:3740qm:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:3770:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:3770k:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:4610y:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:4650u:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:4700ec:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:4700eq:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:4700hq:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:4765t:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:4770:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:4770hq:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:4770k:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:4860hq:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:4870hq:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:4900mq:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:4910mq:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:5850eq:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:5850hq:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:5950hq:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:7500u:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:8550u:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:8650u:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:8700:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:8700k:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:720qm:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:740qm:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:820qm:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:840qm:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:965:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:970:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:975:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:980:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:2715qe:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:2720qm:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:2760qm:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:2820qm:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:3612qm:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:3615qe:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:3615qm:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:3630qm:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:3632qm:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:4500u:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:4510u:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:4550u:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:4558u:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:4710hq:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:4710mq:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:4712hq:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:4712mq:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:4785t:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:4790:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:4790k:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:4790s:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:5550u:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:5557u:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:660lm:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:660um:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:860s:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:870s:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:940xm:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:960:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:980x:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:2600:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:5600u:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:5650u:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:7700:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:7700hq:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:7700k:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:7700t:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:620um:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:640lm:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:640m:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:640um:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:875k:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:880:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:920:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:920xm:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:930:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:2600s:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:2610ue:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:2617m:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:2620m:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:2635qm:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:2637m:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:2670qm:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:2677m:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:2710qe:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:2860qm:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:2960xm:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:3610qe:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:3612qe:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:3667u:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:3689y:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:3770s:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:3820qm:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:4600m:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:4610m:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:4702ec:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:4702mq:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:4720hq:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:4750hq:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:4770s:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:4770te:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:4800mq:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:4850hq:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:4950hq:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:4980hq:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:5700hq:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:5775c:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:7567u:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:7660u:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:7820eq:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:7820hq:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:620le:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:620m:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:660ue:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:680um:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:860:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:870:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:940:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:950:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:990x:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:2600k:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7:2629m:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_m:5y10a:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_m:5y31:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_m:5y51:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_m:5y70:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_m:5y71:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_m:5y10:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_m:5y10c:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_m3:6y30:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_m3:7y30:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_m3:7y32:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_m5:6y54:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_m5:6y57:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_m7:6y75:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_j:j2850:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_j:j2900:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_j:j4205:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_j:j3710:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_n:n4200:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_n:n3530:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_n:n3700:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_n:n3510:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_n:n3520:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_n:n3540:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_n:n3710:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon:e5530:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon:e5603:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon:e5640:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon:e5649:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon:ec5539:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon:l3406:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon:l5609:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon:e5606:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon:e5607:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon:e5620:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon:e5630:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon:l5506:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon:l5508:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon:l5518:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon:l5520:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon:w5580:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon:w5590:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon:x3430:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon:x3440:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon:x5672:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon:x5675:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon:x5677:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon:x5680:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon:l5630:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon:lc5518:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon:w3670:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon:w3690:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon:x3450:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon:x3470:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon:x5660:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon:x5670:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon:x5687:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon:x6550:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon:x7550:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon:e5503:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon:e5504:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon:e5506:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon:e5507:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon:e6540:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon:e7520:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon:e7530:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon:e7540:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon:ec5509:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon:l5638:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon:l5640:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon:l7545:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon:l7555:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon:x5550:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon:x5560:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon:x5570:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon:x5647:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon:x7560:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon:e5502:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon:e5520:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon:e5540:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon:e5645:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon:e6510:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon:ec5549:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon:l3426:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon:l5530:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon:l5618:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon:lc5528:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon:w3680:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon:x3460:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon:x3480:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon:x5650:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon:x5667:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon:x5690:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon:x7542:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_bronze_3106:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_bronze_3104:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3_1220:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3_1220_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3_1220l_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3_1225_v2:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3_1230_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3_1230_v6:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3_1240_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3_1240_v6:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3_1245_v2:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3_1245_v5:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3_1265l_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3_1268l_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3_1271_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3_1275_v2:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3_1276_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3_1280:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3_1285_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3_1285l_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3_1501m_v6:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3_1505l_v6:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3:1535m_v6:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3:1558l_v5:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e-1105c:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3_1105c_v2:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3_1125c:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3_1225_v5:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3_1225_v6:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3_1226_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3_1230:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3_1240l_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3_1240l_v5:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3_1241_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3_1245:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3_1270:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3_1270_v2:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3_1270_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3_1270_v5:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3_1280_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3_1280_v5:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3_1220_v5:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3_1220_v6:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3_12201:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3_12201_v2:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3_1231_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3_1235:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3_1235l_v5:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3_1240:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3_1246_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3_1258l_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3_1260l:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3_1260l_v5:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3_1275_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3_1275_v5:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3_1275_v6:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3_1275l_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3_1286_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3_1286l_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3_1290:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3_1290_v2:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3:1575m_v5:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3:1578l_v5:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3:1585_v5:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3:1585l_v5:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3_1280_v6:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3_1281_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3_1505m_v5:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3:1505m_v6:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3:1515m_v5:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3:1535m_v5:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3_1125c_v2:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3_1220_v2:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3_1225:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3_1225_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3_1230_v2:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3_1230_v5:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3_1230l_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3_1240_v2:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3_1240_v5:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3_1245_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3_1245_v6:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3_1265l_v2:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3_1265l_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3_1268l_v5:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3_1270_v6:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3_1275:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3_1278l_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3_1280_v2:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3_1285_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3_1285_v6:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3_1285l_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3_1501l_v6:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3_1505l_v5:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3:1545m_v5:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3:1565l_v5:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_1620_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_1630_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_1630_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_1650:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_2408l_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_2418l:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_2418l_v2:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_2418l_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_2448l:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_2448l_v2:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_2450:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_2450_v2:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_2450l:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_2609_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_2618l_v2:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_2618l_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_1620:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_1620_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_1650_v2:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_1650_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_2403:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_2407:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_2420_v2:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_2428l_v2:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_2430l_v2:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_2440:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_2450l_v2:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_2470_v2:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_2609:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_2609_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_2620:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_2620_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_2630:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_2630_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_2637_v2:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_2637_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_2643:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_2643_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_2648l:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_2650_v2:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_2650_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5:2658_v3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5:2658a_v3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5:2665:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5:2667_v2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5:2667_v4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5:2680_v2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5:2680_v4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5:2690:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5:2690_v3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5:2697_v4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5:2698_v3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5:2699r_v4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5:4603_v2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5:4617:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5:4620_v2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5:4628l_v4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5:4640_v2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5:4650_v2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5:4650_v4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5:4667_v3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5:4669_v3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_1428l:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_1428l_v2:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_1660_v2:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_1660_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_1660_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_1680_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_1680_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_2428l_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_2430:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_2430_v2:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_2430l:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_2603_v2:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_2603_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_2603_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_2608l_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_2623_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_2623_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_2628l_v2:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_2628l_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_2628l_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_2640:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_2640_v2:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_2640_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_2640_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_2650l_v2:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_2650l_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5:2650l_v4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5:2658:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5:2670:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5:2670_v2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5:2670_v3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5:2680:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5:2690_v4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5:2695_v2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5:2695_v3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5:2695_v4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5:2697_v2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5:4607_v2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5:4610:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5:4610_v2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5:4610_v3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5:4640_v3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5:4640_v4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5:4648_v3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5:4650:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5:4669_v4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_2618l_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_2630l:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_2630l_v2:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_2630l_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_2630l_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_2648l_v2:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_2648l_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_2648l_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_2650:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5:2660:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5:2660_v2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5:2660_v3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5:2660_v4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5:2683_v4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5:2687w:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5:2687w_v2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5:2687w_v3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5:2698_v4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5:2699_v3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5:2699_v4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5:2699a_v4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5:4620_v3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5:4620_v4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5:4624l_v2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5:4627_v2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5:4627_v3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5:4655_v3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5:4655_v4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5:4657l_v2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5:4660_v3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_1428l_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_1620_v2:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_1650_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_1660:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_2403_v2:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_2407_v2:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_2420:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_2428l:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_2438l_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_2440_v2:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_2470:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_2603:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_2608l_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_2609_v2:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_2620_v2:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_2620_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_2630_v2:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_2630_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_2637:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_2637_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_2643_v2:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_2643_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_2650_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5_2650l:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5:2658_v2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5:2658_v4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5:2667:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5:2667_v3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5:2680_v3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5:2683_v3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5:2687w_v4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5:2690_v2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5:2697_v3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5:2697a_v4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5:4603:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5:4607:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5:4610_v4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5:4620:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5:4627_v4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5:4640:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5:4650_v3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5:4650l:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5:4660_v4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5:4667_v4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e7:2860:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e7:2870:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e7:2870_v2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e7:2880_v2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e7:2890_v2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e7:4850:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e7:4850_v2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e7:4850_v3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e7:4850_v4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e7:8860_v4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e7:8867_v3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e7:8867_v4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e7:8867l:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e7:8891_v3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e7:8891_v4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e7:8893_v2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e7:8893_v3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e7:2830:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e7:2850_v2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e7:4809_v2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e7:4809_v4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e7:4830:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e7:4830_v3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e7:4860_v2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e7:4870_v2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e7:8857_v2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e7:8860_v3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e7:8870:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e7:8870_v3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e7:8890_v2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e7:8890_v4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e7:8894_v4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e7:2803:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e7:4820:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e7:4820_v2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e7:4820_v3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e7:4820_v4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e7:4880_v2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e7:4890_v2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e7:8830:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e7:8837:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e7:8850:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e7:8880_v2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e7:8880_v3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e7:8880_v4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e7:8880l_v2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e7:2820:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e7:2850:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e7:4807:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e7:4809_v3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e7:4830_v2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e7:4830_v4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e7:4860:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e7:4870:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e7:8850_v2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e7:8860:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e7:8870_v2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e7:8870_v4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e7:8880l_v3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e7:8890_v3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e7:8891_v2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e7:8893_v4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold:5122:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold:6126:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold:6126f:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold:6126t:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold:6142:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold:6142f:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold:6142m:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold:6144:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold:5118:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold:5120:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold:6130:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold:6130t:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold:6138t:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold:6140m:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold:6146:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold:6148f:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold:5115:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold:6132:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold:6134:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold:6134m:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold:6136:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold:6138:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold:6152:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold:6154:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold:5119t:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold:5120t:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold:6128:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold:6130f:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold:6138f:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold:6140:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold:6148:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold:6150:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_phi:7210:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_phi:7210f:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_phi:7230:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_phi:7230f:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_phi:7235:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_phi:7250f:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_phi:7290:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_phi:7290f:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_phi:7295:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_phi:7250:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_phi:7285:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum:8153:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum:8156:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum:8158:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum:8160:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum:8160f:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum:8160t:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum:8176m:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum:8168:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum:8170:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum:8170m:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum:8176:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum:8160m:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum:8164:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum:8176f:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum:8180:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_silver:4108:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_silver:4109t:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_silver:4112:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_silver:4114t:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_silver:4116:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_silver:4116t:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_silver:4110:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_silver:4114:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:h:arm:cortex-a:75:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:arm:cortex-a:76:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:arm:cortex-r:8:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:arm:cortex-a:15:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:arm:cortex-a:57:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:arm:cortex-a:73:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:arm:cortex-r:7:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:arm:cortex-a:8:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:arm:cortex-a:9:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:arm:cortex-a:12:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:arm:cortex-a:17:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:arm:cortex-a:72:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:oracle:communications_eagle_application_processor:16.1.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:oracle:communications_eagle_application_processor:16.2.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:oracle:communications_lsms:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "13.3",
                        versionStartIncluding: "13.1",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:schneider-electric:struxureware_data_center_expert:7.6.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:netapp:solidfire_element_os_management_node:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:fujitsu:m12-1_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "xcp3090",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:fujitsu:m12-1:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:fujitsu:m12-2_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "xcp3090",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:fujitsu:m12-2:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:fujitsu:m12-2s_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "xcp3090",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:fujitsu:m12-2s:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2018-3693",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Red Hat",
      sources: [
         {
            db: "PACKETSTORM",
            id: "156020",
         },
         {
            db: "PACKETSTORM",
            id: "148907",
         },
         {
            db: "PACKETSTORM",
            id: "153815",
         },
         {
            db: "PACKETSTORM",
            id: "148898",
         },
         {
            db: "PACKETSTORM",
            id: "148899",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201807-884",
         },
      ],
      trust: 1.1,
   },
   cve: "CVE-2018-3693",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "MEDIUM",
                  accessVector: "LOCAL",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "NONE",
                  baseScore: 4.7,
                  confidentialityImpact: "COMPLETE",
                  exploitabilityScore: 3.4,
                  impactScore: 6.9,
                  integrityImpact: "NONE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "MEDIUM",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:L/AC:M/Au:N/C:C/I:N/A:N",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Medium",
                  accessVector: "Local",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "None",
                  baseScore: 4.7,
                  confidentialityImpact: "Complete",
                  exploitabilityScore: null,
                  id: "CVE-2018-3693",
                  impactScore: null,
                  integrityImpact: "None",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "Medium",
                  trust: 0.9,
                  userInteractionRequired: null,
                  vectorString: "AV:L/AC:M/Au:N/C:C/I:N/A:N",
                  version: "2.0",
               },
               {
                  accessComplexity: "MEDIUM",
                  accessVector: "LOCAL",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "NONE",
                  baseScore: 4.7,
                  confidentialityImpact: "COMPLETE",
                  exploitabilityScore: 3.4,
                  id: "VHN-133724",
                  impactScore: 6.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 0.1,
                  vectorString: "AV:L/AC:M/AU:N/C:C/I:N/A:N",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "HIGH",
                  attackVector: "LOCAL",
                  author: "NVD",
                  availabilityImpact: "NONE",
                  baseScore: 5.6,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 1.1,
                  impactScore: 4,
                  integrityImpact: "NONE",
                  privilegesRequired: "LOW",
                  scope: "CHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
                  version: "3.1",
               },
               {
                  attackComplexity: "High",
                  attackVector: "Local",
                  author: "NVD",
                  availabilityImpact: "None",
                  baseScore: 5.6,
                  baseSeverity: "Medium",
                  confidentialityImpact: "High",
                  exploitabilityScore: null,
                  id: "CVE-2018-3693",
                  impactScore: null,
                  integrityImpact: "None",
                  privilegesRequired: "Low",
                  scope: "Changed",
                  trust: 0.8,
                  userInteraction: "None",
                  vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2018-3693",
                  trust: 1.8,
                  value: "MEDIUM",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201807-884",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULHUB",
                  id: "VHN-133724",
                  trust: 0.1,
                  value: "MEDIUM",
               },
               {
                  author: "VULMON",
                  id: "CVE-2018-3693",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-133724",
         },
         {
            db: "VULMON",
            id: "CVE-2018-3693",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2018-005796",
         },
         {
            db: "NVD",
            id: "CVE-2018-3693",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201807-884",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a speculative buffer overflow and side-channel analysis. Intel Systems with microprocessors contain information disclosure vulnerabilities.Information may be obtained. Multiple CPU Hardware are prone to an information-disclosure vulnerability. \nAttackers can exploit this issue to obtain sensitive information that may aid in further attacks. ARM CPU is a CPU (central processing unit) product of the British ARM company. Intel CPU is a CPU (central processing unit) product of Intel Corporation of the United States. This vulnerability stems from configuration errors in network systems or products during operation. 7) - aarch64, noarch, ppc64le\n\n3. \n\nBug Fix(es):\n\n* Kernel panic on job cleanup, related to SyS_getdents64 (BZ#1702057)\n\n* Kernel modules generated incorrectly when system is localized to\nnon-English language (BZ#1705285)\n\n* RHEL-Alt-7.6 - Fixup tlbie vs store ordering issue on POWER9 (BZ#1756270)\n\n4. \n1713059 - CVE-2019-3846 kernel: Heap overflow in mwifiex_update_bss_desc_with_ie function in marvell/mwifiex/scan.c\n1716992 - CVE-2019-10126 kernel: Heap overflow in mwifiex_uap_parse_tail_ies function in drivers/net/wireless/marvell/mwifiex/ie.c\n1744130 - CVE-2019-14814 kernel: heap overflow in mwifiex_set_uap_rates() function of Marvell Wifi Driver leading to DoS\n1744137 - CVE-2019-14815 kernel: heap-overflow in mwifiex_set_wmm_params() function of Marvell WiFi driver leading to DoS\n1744149 - CVE-2019-14816 kernel: heap overflow in mwifiex_update_vs_ie() function of Marvell WiFi driver\n1771909 - CVE-2019-17133 kernel: buffer overflow in cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c\n1777825 - CVE-2019-18660 kernel: (powerpc) incomplete Spectre-RSB mitigation leads to information exposure\n\n6. 7) - noarch, x86_64\n\n3. Description:\n\nThe kernel-rt packages provide the Real Time Linux Kernel, which enables\nfine-tuning for systems with extremely high determinism requirements. \n(BZ#1594915)\n\n4. \n\nBug Fix(es):\n\n* ovl_create can return positive retval and crash the host (BZ#1696290)\n\n* THP: Race between MADV_DONTNEED and NUMA hinting node migration code\n(BZ#1698105)\n\n* RHEL7.6 - Kernel changes for count cache flush Spectre v2 mitigation\n(BZ#1708543)\n\n* Poor system performance from thundering herd of kworkers competing for\nmddev->flush_bio ownership (BZ#1712762)\n\n* [RHEL7.7] RAID1 `write-behind` causes a kernel panic (BZ#1712999)\n\nEnhancement(s):\n\n* [Intel 7.5 FEAT] i40evf - Update to latest upstream driver version\n(BZ#1722774)\n\n* [netdrv] i40e/i40evf: Fix use after free in Rx cleanup path [7.4.z]\n(BZ#1723831)\n\nUsers of kernel are advised to upgrade to these updated packages, which fix\nthese bugs and add these enhancements. 6) - i386, x86_64\n\n3. \n\nBug Fix(es):\n\n* The Least recently used (LRU) operations are batched by caching pages in\nper-cpu page vectors to prevent contention of the heavily used lru_lock\nspinlock. The page vectors can hold even the compound pages. Previously,\nthe page vectors were cleared only if they were full. Subsequently, the\namount of memory held in page vectors, which is not reclaimable, was\nsometimes too high. Consequently the page reclamation started the Out of\nMemory (OOM) killing processes. With this update, the underlying source\ncode has been fixed to clear LRU page vectors each time when a compound\npage is added to them. As a result, OOM killing processes due to high\namounts of memory held in page vectors no longer occur. (BZ#1575819)\n\n4. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n====================================================================                   \nRed Hat Security Advisory\n\nSynopsis:          Important: kernel security and bug fix update\nAdvisory ID:       RHSA-2018:2384-01\nProduct:           Red Hat Enterprise Linux\nAdvisory URL:      https://access.redhat.com/errata/RHSA-2018:2384\nIssue date:        2018-08-14\nCVE Names:         CVE-2017-13215 CVE-2018-3620 CVE-2018-3646\n                   CVE-2018-3693 CVE-2018-5390 CVE-2018-7566\n                   CVE-2018-10675\n====================================================================\n1. Summary:\n\nAn update for kernel is now available for Red Hat Enterprise Linux 7. \n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Client (v. 7) - noarch, x86_64\nRed Hat Enterprise Linux Client Optional (v. 7) - x86_64\nRed Hat Enterprise Linux ComputeNode (v. 7) - noarch, x86_64\nRed Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64\nRed Hat Enterprise Linux Server (v. 7) - noarch, ppc64, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, x86_64\nRed Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 7) - x86_64\nRed Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7) - noarch, ppc64le, s390x\nRed Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7) - noarch, ppc64le\n\n3. Description:\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system. \n\nSecurity Fix(es):\n\n* Modern operating systems implement virtualization of physical memory to\nefficiently use available system resources and provide inter-domain\nprotection through access control and isolation. The L1TF issue was found\nin the way the x86 microprocessor designs have implemented speculative\nexecution of instructions (a commonly used performance optimisation) in\ncombination with handling of page-faults caused by terminated virtual to\nphysical address resolving process. As a result, an unprivileged attacker\ncould use this flaw to read privileged memory of the kernel or other\nprocesses and/or cross guest/host boundaries to read host memory by\nconducting targeted cache side-channel attacks. (CVE-2018-3620,\nCVE-2018-3646)\n\n* An industry-wide issue was found in the way many modern microprocessor\ndesigns have implemented speculative execution of instructions past bounds\ncheck. The flaw relies on the presence of a precisely-defined instruction\nsequence in the privileged code and the fact that memory writes occur to an\naddress which depends on the untrusted value. Such writes cause an update\ninto the microprocessor's data cache even for speculatively executed\ninstructions that never actually commit (retire). As a result, an\nunprivileged attacker could use this flaw to influence speculative\nexecution and/or read privileged memory by conducting targeted cache\nside-channel attacks. (CVE-2018-3693)\n\n* A flaw named SegmentSmack was found in the way the Linux kernel handled\nspecially crafted TCP packets. A remote attacker could use this flaw to\ntrigger time and calculation expensive calls to tcp_collapse_ofo_queue()\nand tcp_prune_ofo_queue() functions by sending specially modified packets\nwithin ongoing TCP sessions which could lead to a CPU saturation and hence\na denial of service on the system. Maintaining the denial of service\ncondition requires continuous two-way TCP sessions to a reachable open\nport, thus the attacks cannot be performed using spoofed IP addresses. \n(CVE-2018-5390)\n\n* kernel: crypto: privilege escalation in skcipher_recvmsg function\n(CVE-2017-13215)\n\n* kernel: mm: use-after-free in do_get_mempolicy function allows local DoS\nor other unspecified impact (CVE-2018-10675)\n\n* kernel: race condition in snd_seq_write() may lead to UAF or OOB access\n(CVE-2018-7566)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, and other related information, refer to the CVE page(s) listed in\nthe References section. \n\nRed Hat would like to thank Intel OSSIRT (Intel.com) for reporting\nCVE-2018-3620 and CVE-2018-3646; Vladimir Kiriansky (MIT) and Carl\nWaldspurger (Carl Waldspurger Consulting) for reporting CVE-2018-3693; and\nJuha-Matti Tilli (Aalto University, Department of Communications and\nNetworking and Nokia Bell Labs) for reporting CVE-2018-5390. \n\nBug Fix(es):\n\nThese updated kernel packages include also numerous bug fixes. Space\nprecludes documenting all of the bug fixes in this advisory. See the\ndescriptions in the related Knowledge Article:\n\nhttps://access.redhat.com/articles/3527791\n\n4. Solution:\n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect. \n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1535173 - CVE-2017-13215 kernel: crypto: privilege escalation in skcipher_recvmsg function\n1550142 - CVE-2018-7566 kernel: race condition in snd_seq_write() may lead to UAF or OOB-access\n1575065 - CVE-2018-10675 kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact\n1581650 - CVE-2018-3693 Kernel: speculative bounds check bypass store\n1585005 - CVE-2018-3646 Kernel: hw: cpu: L1 terminal fault (L1TF)\n1601704 - CVE-2018-5390 kernel: TCP segments with random offsets allow a remote denial of service (SegmentSmack)\n\n6. Package List:\n\nRed Hat Enterprise Linux Client (v. 7):\n\nSource:\nkernel-3.10.0-862.11.6.el7.src.rpm\n\nnoarch:\nkernel-abi-whitelists-3.10.0-862.11.6.el7.noarch.rpm\nkernel-doc-3.10.0-862.11.6.el7.noarch.rpm\n\nx86_64:\nkernel-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-debug-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-debug-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-debug-devel-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-devel-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-headers-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-tools-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-tools-libs-3.10.0-862.11.6.el7.x86_64.rpm\nperf-3.10.0-862.11.6.el7.x86_64.rpm\nperf-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\npython-perf-3.10.0-862.11.6.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Client Optional (v. 7):\n\nx86_64:\nkernel-debug-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-tools-libs-devel-3.10.0-862.11.6.el7.x86_64.rpm\nperf-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode (v. 7):\n\nSource:\nkernel-3.10.0-862.11.6.el7.src.rpm\n\nnoarch:\nkernel-abi-whitelists-3.10.0-862.11.6.el7.noarch.rpm\nkernel-doc-3.10.0-862.11.6.el7.noarch.rpm\n\nx86_64:\nkernel-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-debug-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-debug-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-debug-devel-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-devel-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-headers-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-tools-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-tools-libs-3.10.0-862.11.6.el7.x86_64.rpm\nperf-3.10.0-862.11.6.el7.x86_64.rpm\nperf-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\npython-perf-3.10.0-862.11.6.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode Optional (v. 7):\n\nx86_64:\nkernel-debug-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-tools-libs-devel-3.10.0-862.11.6.el7.x86_64.rpm\nperf-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 7):\n\nSource:\nkernel-3.10.0-862.11.6.el7.src.rpm\n\nnoarch:\nkernel-abi-whitelists-3.10.0-862.11.6.el7.noarch.rpm\nkernel-doc-3.10.0-862.11.6.el7.noarch.rpm\n\nppc64:\nkernel-3.10.0-862.11.6.el7.ppc64.rpm\nkernel-bootwrapper-3.10.0-862.11.6.el7.ppc64.rpm\nkernel-debug-3.10.0-862.11.6.el7.ppc64.rpm\nkernel-debug-debuginfo-3.10.0-862.11.6.el7.ppc64.rpm\nkernel-debug-devel-3.10.0-862.11.6.el7.ppc64.rpm\nkernel-debuginfo-3.10.0-862.11.6.el7.ppc64.rpm\nkernel-debuginfo-common-ppc64-3.10.0-862.11.6.el7.ppc64.rpm\nkernel-devel-3.10.0-862.11.6.el7.ppc64.rpm\nkernel-headers-3.10.0-862.11.6.el7.ppc64.rpm\nkernel-tools-3.10.0-862.11.6.el7.ppc64.rpm\nkernel-tools-debuginfo-3.10.0-862.11.6.el7.ppc64.rpm\nkernel-tools-libs-3.10.0-862.11.6.el7.ppc64.rpm\nperf-3.10.0-862.11.6.el7.ppc64.rpm\nperf-debuginfo-3.10.0-862.11.6.el7.ppc64.rpm\npython-perf-3.10.0-862.11.6.el7.ppc64.rpm\npython-perf-debuginfo-3.10.0-862.11.6.el7.ppc64.rpm\n\nppc64le:\nkernel-3.10.0-862.11.6.el7.ppc64le.rpm\nkernel-bootwrapper-3.10.0-862.11.6.el7.ppc64le.rpm\nkernel-debug-3.10.0-862.11.6.el7.ppc64le.rpm\nkernel-debug-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm\nkernel-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm\nkernel-debuginfo-common-ppc64le-3.10.0-862.11.6.el7.ppc64le.rpm\nkernel-devel-3.10.0-862.11.6.el7.ppc64le.rpm\nkernel-headers-3.10.0-862.11.6.el7.ppc64le.rpm\nkernel-tools-3.10.0-862.11.6.el7.ppc64le.rpm\nkernel-tools-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm\nkernel-tools-libs-3.10.0-862.11.6.el7.ppc64le.rpm\nperf-3.10.0-862.11.6.el7.ppc64le.rpm\nperf-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm\npython-perf-3.10.0-862.11.6.el7.ppc64le.rpm\npython-perf-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm\n\ns390x:\nkernel-3.10.0-862.11.6.el7.s390x.rpm\nkernel-debug-3.10.0-862.11.6.el7.s390x.rpm\nkernel-debug-debuginfo-3.10.0-862.11.6.el7.s390x.rpm\nkernel-debug-devel-3.10.0-862.11.6.el7.s390x.rpm\nkernel-debuginfo-3.10.0-862.11.6.el7.s390x.rpm\nkernel-debuginfo-common-s390x-3.10.0-862.11.6.el7.s390x.rpm\nkernel-devel-3.10.0-862.11.6.el7.s390x.rpm\nkernel-headers-3.10.0-862.11.6.el7.s390x.rpm\nkernel-kdump-3.10.0-862.11.6.el7.s390x.rpm\nkernel-kdump-debuginfo-3.10.0-862.11.6.el7.s390x.rpm\nkernel-kdump-devel-3.10.0-862.11.6.el7.s390x.rpm\nperf-3.10.0-862.11.6.el7.s390x.rpm\nperf-debuginfo-3.10.0-862.11.6.el7.s390x.rpm\npython-perf-3.10.0-862.11.6.el7.s390x.rpm\npython-perf-debuginfo-3.10.0-862.11.6.el7.s390x.rpm\n\nx86_64:\nkernel-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-debug-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-debug-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-debug-devel-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-devel-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-headers-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-tools-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-tools-libs-3.10.0-862.11.6.el7.x86_64.rpm\nperf-3.10.0-862.11.6.el7.x86_64.rpm\nperf-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\npython-perf-3.10.0-862.11.6.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\n\nRed Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7):\n\nnoarch:\nkernel-abi-whitelists-3.10.0-862.11.6.el7.noarch.rpm\nkernel-doc-3.10.0-862.11.6.el7.noarch.rpm\n\nppc64le:\nkernel-3.10.0-862.11.6.el7.ppc64le.rpm\nkernel-bootwrapper-3.10.0-862.11.6.el7.ppc64le.rpm\nkernel-debug-3.10.0-862.11.6.el7.ppc64le.rpm\nkernel-debug-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm\nkernel-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm\nkernel-debuginfo-common-ppc64le-3.10.0-862.11.6.el7.ppc64le.rpm\nkernel-devel-3.10.0-862.11.6.el7.ppc64le.rpm\nkernel-headers-3.10.0-862.11.6.el7.ppc64le.rpm\nkernel-tools-3.10.0-862.11.6.el7.ppc64le.rpm\nkernel-tools-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm\nkernel-tools-libs-3.10.0-862.11.6.el7.ppc64le.rpm\nperf-3.10.0-862.11.6.el7.ppc64le.rpm\nperf-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm\npython-perf-3.10.0-862.11.6.el7.ppc64le.rpm\npython-perf-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm\n\ns390x:\nkernel-3.10.0-862.11.6.el7.s390x.rpm\nkernel-debug-3.10.0-862.11.6.el7.s390x.rpm\nkernel-debug-debuginfo-3.10.0-862.11.6.el7.s390x.rpm\nkernel-debug-devel-3.10.0-862.11.6.el7.s390x.rpm\nkernel-debuginfo-3.10.0-862.11.6.el7.s390x.rpm\nkernel-debuginfo-common-s390x-3.10.0-862.11.6.el7.s390x.rpm\nkernel-devel-3.10.0-862.11.6.el7.s390x.rpm\nkernel-headers-3.10.0-862.11.6.el7.s390x.rpm\nkernel-kdump-3.10.0-862.11.6.el7.s390x.rpm\nkernel-kdump-debuginfo-3.10.0-862.11.6.el7.s390x.rpm\nkernel-kdump-devel-3.10.0-862.11.6.el7.s390x.rpm\nperf-3.10.0-862.11.6.el7.s390x.rpm\nperf-debuginfo-3.10.0-862.11.6.el7.s390x.rpm\npython-perf-3.10.0-862.11.6.el7.s390x.rpm\npython-perf-debuginfo-3.10.0-862.11.6.el7.s390x.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 7):\n\nppc64:\nkernel-debug-debuginfo-3.10.0-862.11.6.el7.ppc64.rpm\nkernel-debuginfo-3.10.0-862.11.6.el7.ppc64.rpm\nkernel-debuginfo-common-ppc64-3.10.0-862.11.6.el7.ppc64.rpm\nkernel-tools-debuginfo-3.10.0-862.11.6.el7.ppc64.rpm\nkernel-tools-libs-devel-3.10.0-862.11.6.el7.ppc64.rpm\nperf-debuginfo-3.10.0-862.11.6.el7.ppc64.rpm\npython-perf-debuginfo-3.10.0-862.11.6.el7.ppc64.rpm\n\nppc64le:\nkernel-debug-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm\nkernel-debug-devel-3.10.0-862.11.6.el7.ppc64le.rpm\nkernel-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm\nkernel-debuginfo-common-ppc64le-3.10.0-862.11.6.el7.ppc64le.rpm\nkernel-tools-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm\nkernel-tools-libs-devel-3.10.0-862.11.6.el7.ppc64le.rpm\nperf-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm\npython-perf-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm\n\nx86_64:\nkernel-debug-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-tools-libs-devel-3.10.0-862.11.6.el7.x86_64.rpm\nperf-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\n\nRed Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7):\n\nnoarch:\nkernel-doc-3.10.0-862.11.6.el7.noarch.rpm\n\nppc64le:\nkernel-debug-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm\nkernel-debug-devel-3.10.0-862.11.6.el7.ppc64le.rpm\nkernel-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm\nkernel-debuginfo-common-ppc64le-3.10.0-862.11.6.el7.ppc64le.rpm\nkernel-tools-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm\nkernel-tools-libs-devel-3.10.0-862.11.6.el7.ppc64le.rpm\nperf-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm\npython-perf-debuginfo-3.10.0-862.11.6.el7.ppc64le.rpm\n\nRed Hat Enterprise Linux Workstation (v. 7):\n\nSource:\nkernel-3.10.0-862.11.6.el7.src.rpm\n\nnoarch:\nkernel-abi-whitelists-3.10.0-862.11.6.el7.noarch.rpm\nkernel-doc-3.10.0-862.11.6.el7.noarch.rpm\n\nx86_64:\nkernel-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-debug-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-debug-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-debug-devel-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-devel-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-headers-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-tools-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-tools-libs-3.10.0-862.11.6.el7.x86_64.rpm\nperf-3.10.0-862.11.6.el7.x86_64.rpm\nperf-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\npython-perf-3.10.0-862.11.6.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 7):\n\nx86_64:\nkernel-debug-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\nkernel-tools-libs-devel-3.10.0-862.11.6.el7.x86_64.rpm\nperf-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-862.11.6.el7.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security.  Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2017-13215\nhttps://access.redhat.com/security/cve/CVE-2018-3620\nhttps://access.redhat.com/security/cve/CVE-2018-3646\nhttps://access.redhat.com/security/cve/CVE-2018-3693\nhttps://access.redhat.com/security/cve/CVE-2018-5390\nhttps://access.redhat.com/security/cve/CVE-2018-7566\nhttps://access.redhat.com/security/cve/CVE-2018-10675\nhttps://access.redhat.com/security/updates/classification/#important\nhttps://access.redhat.com/security/vulnerabilities/L1TF\nhttps://access.redhat.com/articles/3527791\n\n8. Contact:\n\nThe Red Hat security contact is <secalert@redhat.com>. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2018 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n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\nlZgWJhC3Yik=i4St\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n",
      sources: [
         {
            db: "NVD",
            id: "CVE-2018-3693",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2018-005796",
         },
         {
            db: "BID",
            id: "108004",
         },
         {
            db: "VULHUB",
            id: "VHN-133724",
         },
         {
            db: "VULMON",
            id: "CVE-2018-3693",
         },
         {
            db: "PACKETSTORM",
            id: "156020",
         },
         {
            db: "PACKETSTORM",
            id: "148907",
         },
         {
            db: "PACKETSTORM",
            id: "153815",
         },
         {
            db: "PACKETSTORM",
            id: "148898",
         },
         {
            db: "PACKETSTORM",
            id: "148899",
         },
      ],
      trust: 2.52,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2018-3693",
            trust: 3.4,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2018-005796",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201807-884",
            trust: 0.7,
         },
         {
            db: "PACKETSTORM",
            id: "156020",
            trust: 0.7,
         },
         {
            db: "PACKETSTORM",
            id: "153815",
            trust: 0.7,
         },
         {
            db: "AUSCERT",
            id: "ESB-2019.2861",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2020.0226",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2019.3234.2",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2019.0544",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2019.1899",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2019.1926",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2019.0726",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2019.3234.3",
            trust: 0.6,
         },
         {
            db: "BID",
            id: "108004",
            trust: 0.3,
         },
         {
            db: "VULHUB",
            id: "VHN-133724",
            trust: 0.1,
         },
         {
            db: "VULMON",
            id: "CVE-2018-3693",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "148907",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "148898",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "148899",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-133724",
         },
         {
            db: "VULMON",
            id: "CVE-2018-3693",
         },
         {
            db: "BID",
            id: "108004",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2018-005796",
         },
         {
            db: "PACKETSTORM",
            id: "156020",
         },
         {
            db: "PACKETSTORM",
            id: "148907",
         },
         {
            db: "PACKETSTORM",
            id: "153815",
         },
         {
            db: "PACKETSTORM",
            id: "148898",
         },
         {
            db: "PACKETSTORM",
            id: "148899",
         },
         {
            db: "NVD",
            id: "CVE-2018-3693",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201807-884",
         },
      ],
   },
   id: "VAR-201807-2218",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VULHUB",
            id: "VHN-133724",
         },
      ],
      trust: 0.8316673154545454,
   },
   last_update_date: "2023-12-25T21:23:25.092000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "INTEL-OSS-10002",
            trust: 0.8,
            url: "https://01.org/security/advisories/intel-oss-10002",
         },
         {
            title: "Red Hat: Important: kernel security, bug fix, and enhancement update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=rhsa-20191946 - security advisory",
         },
         {
            title: "Red Hat: Important: kernel-rt security and bug fix update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=rhsa-20182395 - security advisory",
         },
         {
            title: "Red Hat: Important: kernel security and bug fix update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=rhsa-20182384 - security advisory",
         },
         {
            title: "Red Hat: CVE-2018-3693",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=cve-2018-3693",
         },
         {
            title: "Red Hat: Important: kernel security and bug fix update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=rhsa-20182390 - security advisory",
         },
         {
            title: "Red Hat: Important: kernel-alt security and bug fix update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=rhsa-20200174 - security advisory",
         },
         {
            title: "Amazon Linux AMI: ALAS-2018-1038",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=alas-2018-1038",
         },
         {
            title: "Amazon Linux 2: ALAS2-2018-1038",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=alas2-2018-1038",
         },
         {
            title: "IBM: IBM Security Bulletin: IBM Security Guardium is affected by Red Hat kernel vulnerabilities",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=75b9d198a73a91d81765c8b428423224",
         },
         {
            title: "Oracle Linux Bulletins: Oracle Linux Bulletin - July 2018",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=oracle_linux_bulletins&qid=204a1aa9ebf7b5f47151e8b011269862",
         },
         {
            title: "Fortinet Security Advisories: Meltdown and Spectre class vulnerabilities",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=fortinet_security_advisories&qid=fg-ir-18-002",
         },
         {
            title: "IBM: IBM Security Bulletin: IBM has announced a release for IBM Security Identity Governance and Intelligence in response to multiple security vulnerabilities",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=55ea315dfb69fce8383762ac64250315",
         },
         {
            title: "Spectre and Meltdown Guidance",
            trust: 0.1,
            url: "https://github.com/danswinus/hwfw ",
         },
         {
            title: "Transient Execution Attack Pot",
            trust: 0.1,
            url: "https://github.com/github-3rr0r/teapot ",
         },
         {
            title: "Transient Execution Attack Pot",
            trust: 0.1,
            url: "https://github.com/mashiro1995/teapot ",
         },
         {
            title: "Hardware attacks / State of the art",
            trust: 0.1,
            url: "https://github.com/codexlynx/hardware-attacks-state-of-the-art ",
         },
         {
            title: "Awesome CVE PoC",
            trust: 0.1,
            url: "https://github.com/lnick2023/nicenice ",
         },
         {
            title: "Awesome CVE PoC",
            trust: 0.1,
            url: "https://github.com/xbl3/awesome-cve-poc_qazbnm456 ",
         },
         {
            title: "Awesome CVE PoC",
            trust: 0.1,
            url: "https://github.com/qazbnm456/awesome-cve-poc ",
         },
         {
            title: "Securelist",
            trust: 0.1,
            url: "https://securelist.com/kaspersky-security-bulletin-2018-top-security-stories/89118/",
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2018-3693",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2018-005796",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "NVD-CWE-noinfo",
            trust: 1,
         },
         {
            problemtype: "CWE-200",
            trust: 0.9,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-133724",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2018-005796",
         },
         {
            db: "NVD",
            id: "CVE-2018-3693",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 2.6,
            url: "https://access.redhat.com/errata/rhsa-2019:1946",
         },
         {
            trust: 2.5,
            url: "https://access.redhat.com/errata/rhsa-2020:0174",
         },
         {
            trust: 2.4,
            url: "https://www.oracle.com/security-alerts/cpuoct2020.html",
         },
         {
            trust: 2.2,
            url: "https://access.redhat.com/errata/rhsa-2018:2384",
         },
         {
            trust: 2.2,
            url: "https://access.redhat.com/errata/rhsa-2018:2390",
         },
         {
            trust: 2.2,
            url: "https://access.redhat.com/errata/rhsa-2018:2395",
         },
         {
            trust: 2.1,
            url: "https://security.netapp.com/advisory/ntap-20180823-0001/",
         },
         {
            trust: 1.8,
            url: "https://cdrdv2.intel.com/v1/dl/getcontent/685359",
         },
         {
            trust: 1.8,
            url: "https://help.ecostruxureit.com/display/public/uadce725/security+fixes+in+struxureware+data+center+expert+v7.6.0",
         },
         {
            trust: 1.8,
            url: "https://www.oracle.com/security-alerts/cpujul2020.html",
         },
         {
            trust: 1.8,
            url: "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
         },
         {
            trust: 1.3,
            url: "https://nvd.nist.gov/vuln/detail/cve-2018-3693",
         },
         {
            trust: 0.9,
            url: "https://www.suse.com/support/kb/doc/?id=7023075",
         },
         {
            trust: 0.9,
            url: "https://01.org/security/advisories/intel-oss-10002",
         },
         {
            trust: 0.8,
            url: "https://access.redhat.com/security/cve/cve-2018-3693",
         },
         {
            trust: 0.8,
            url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-3693",
         },
         {
            trust: 0.6,
            url: "https://thehackernews.com/2018/07/intel-spectre-vulnerability.html",
         },
         {
            trust: 0.6,
            url: "https://support.f5.com/csp/article/k54252492",
         },
         {
            trust: 0.6,
            url: "https://fortiguard.com/psirt/fg-ir-18-002",
         },
         {
            trust: 0.6,
            url: "http://www.ibm.com/support/docview.wss?uid=ibm10872142",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/75922",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2019.3234.2/",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2019.3234.3/",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/76682",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2020.0226/",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2019.2861/",
         },
         {
            trust: 0.6,
            url: "https://packetstormsecurity.com/files/153815/red-hat-security-advisory-2019-1946-01.html",
         },
         {
            trust: 0.6,
            url: "https://packetstormsecurity.com/files/156020/red-hat-security-advisory-2020-0174-01.html",
         },
         {
            trust: 0.6,
            url: "http://www.ibm.com/support/docview.wss?uid=ibm10872470",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2019.1926/",
         },
         {
            trust: 0.6,
            url: "https://www-01.ibm.com/support/docview.wss?uid=ibm10872142",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2019.1899/",
         },
         {
            trust: 0.5,
            url: "https://access.redhat.com/security/updates/classification/#important",
         },
         {
            trust: 0.5,
            url: "https://access.redhat.com/articles/11258",
         },
         {
            trust: 0.5,
            url: "https://access.redhat.com/security/team/contact/",
         },
         {
            trust: 0.5,
            url: "https://www.redhat.com/mailman/listinfo/rhsa-announce",
         },
         {
            trust: 0.5,
            url: "https://bugzilla.redhat.com/):",
         },
         {
            trust: 0.5,
            url: "https://access.redhat.com/security/team/key/",
         },
         {
            trust: 0.3,
            url: "http://www.amd.com/en-gb",
         },
         {
            trust: 0.3,
            url: "https://www.arm.com/",
         },
         {
            trust: 0.3,
            url: "http://www.intel.com/content/www/us/en/homepage.html",
         },
         {
            trust: 0.3,
            url: "https://www.intel.in/content/www/in/en/support/articles/000029382/processors.html",
         },
         {
            trust: 0.3,
            url: "https://bugzilla.redhat.com/show_bug.cgi?id=1581650",
         },
         {
            trust: 0.3,
            url: "https://www.ibm.com/blogs/psirt/ibm-security-bulletin-ibm-has-announced-a-release-for-ibm-security-identity-governance-and-intelligence-in-response-to-multiple-security-vulnerabilities-2/",
         },
         {
            trust: 0.3,
            url: "https://www-01.ibm.com/support/docview.wss?uid=ibm10742755",
         },
         {
            trust: 0.3,
            url: "https://people.csail.mit.edu/vlk/spectre11.pdf",
         },
         {
            trust: 0.3,
            url: "https://access.redhat.com/security/vulnerabilities/l1tf",
         },
         {
            trust: 0.3,
            url: "https://access.redhat.com/security/cve/cve-2018-7566",
         },
         {
            trust: 0.3,
            url: "https://access.redhat.com/security/cve/cve-2018-3620",
         },
         {
            trust: 0.3,
            url: "https://nvd.nist.gov/vuln/detail/cve-2018-7566",
         },
         {
            trust: 0.3,
            url: "https://nvd.nist.gov/vuln/detail/cve-2018-3620",
         },
         {
            trust: 0.3,
            url: "https://nvd.nist.gov/vuln/detail/cve-2018-3646",
         },
         {
            trust: 0.3,
            url: "https://access.redhat.com/security/cve/cve-2018-3646",
         },
         {
            trust: 0.2,
            url: "https://access.redhat.com/solutions/3523601",
         },
         {
            trust: 0.2,
            url: "https://nvd.nist.gov/vuln/detail/cve-2017-13215",
         },
         {
            trust: 0.2,
            url: "https://nvd.nist.gov/vuln/detail/cve-2018-5390",
         },
         {
            trust: 0.2,
            url: "https://access.redhat.com/security/cve/cve-2017-13215",
         },
         {
            trust: 0.2,
            url: "https://nvd.nist.gov/vuln/detail/cve-2018-10675",
         },
         {
            trust: 0.2,
            url: "https://access.redhat.com/security/cve/cve-2018-5390",
         },
         {
            trust: 0.2,
            url: "https://access.redhat.com/security/cve/cve-2018-10675",
         },
         {
            trust: 0.1,
            url: "https://cwe.mitre.org/data/definitions/.html",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov",
         },
         {
            trust: 0.1,
            url: "https://github.com/github-3rr0r/teapot",
         },
         {
            trust: 0.1,
            url: "https://tools.cisco.com/security/center/viewalert.x?alertid=58431",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2019-14815",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2019-14815",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2019-18660",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2018-18559",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2019-3846",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2019-17133",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2019-3846",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2019-8912",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2019-14816",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2019-11487",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2019-11487",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2019-10126",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2018-18559",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2019-8912",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2019-18660",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2019-14814",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2019-14816",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2019-17133",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2019-14814",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2019-10126",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2017-15129",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2017-12154",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2018-14633",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2017-12154",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2018-14633",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2017-15274",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2017-15129",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2017-15274",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2017-15265",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2017-15265",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2018-1000004",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2017-0861",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2017-0861",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2018-10901",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2018-1000004",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2018-10901",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/articles/3527791",
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-133724",
         },
         {
            db: "VULMON",
            id: "CVE-2018-3693",
         },
         {
            db: "BID",
            id: "108004",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2018-005796",
         },
         {
            db: "PACKETSTORM",
            id: "156020",
         },
         {
            db: "PACKETSTORM",
            id: "148907",
         },
         {
            db: "PACKETSTORM",
            id: "153815",
         },
         {
            db: "PACKETSTORM",
            id: "148898",
         },
         {
            db: "PACKETSTORM",
            id: "148899",
         },
         {
            db: "NVD",
            id: "CVE-2018-3693",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201807-884",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULHUB",
            id: "VHN-133724",
         },
         {
            db: "VULMON",
            id: "CVE-2018-3693",
         },
         {
            db: "BID",
            id: "108004",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2018-005796",
         },
         {
            db: "PACKETSTORM",
            id: "156020",
         },
         {
            db: "PACKETSTORM",
            id: "148907",
         },
         {
            db: "PACKETSTORM",
            id: "153815",
         },
         {
            db: "PACKETSTORM",
            id: "148898",
         },
         {
            db: "PACKETSTORM",
            id: "148899",
         },
         {
            db: "NVD",
            id: "CVE-2018-3693",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201807-884",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2018-07-10T00:00:00",
            db: "VULHUB",
            id: "VHN-133724",
         },
         {
            date: "2018-07-10T00:00:00",
            db: "VULMON",
            id: "CVE-2018-3693",
         },
         {
            date: "2018-07-10T00:00:00",
            db: "BID",
            id: "108004",
         },
         {
            date: "2018-07-30T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2018-005796",
         },
         {
            date: "2020-01-21T19:10:15",
            db: "PACKETSTORM",
            id: "156020",
         },
         {
            date: "2018-08-15T04:40:44",
            db: "PACKETSTORM",
            id: "148907",
         },
         {
            date: "2019-07-30T18:19:52",
            db: "PACKETSTORM",
            id: "153815",
         },
         {
            date: "2018-08-15T04:37:29",
            db: "PACKETSTORM",
            id: "148898",
         },
         {
            date: "2018-08-15T04:37:37",
            db: "PACKETSTORM",
            id: "148899",
         },
         {
            date: "2018-07-10T21:29:01.340000",
            db: "NVD",
            id: "CVE-2018-3693",
         },
         {
            date: "2018-07-11T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201807-884",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2021-11-19T00:00:00",
            db: "VULHUB",
            id: "VHN-133724",
         },
         {
            date: "2022-04-18T00:00:00",
            db: "VULMON",
            id: "CVE-2018-3693",
         },
         {
            date: "2018-07-10T00:00:00",
            db: "BID",
            id: "108004",
         },
         {
            date: "2018-07-30T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2018-005796",
         },
         {
            date: "2022-04-18T18:15:50.777000",
            db: "NVD",
            id: "CVE-2018-3693",
         },
         {
            date: "2021-11-23T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201807-884",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "local",
      sources: [
         {
            db: "BID",
            id: "108004",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201807-884",
         },
      ],
      trust: 0.9,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Intel Information disclosure vulnerability in systems with microprocessors",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2018-005796",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "information disclosure",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201807-884",
         },
      ],
      trust: 0.6,
   },
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.