nist-gov/nvd.nist.gov/vuln/detail/CVE-2022-26837
2025-03-07 17:19:30 +00:00

8061 lines
797 KiB
Text
Raw Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

<!DOCTYPE html>
<html lang="en">
<head>
<title>NVD - CVE-2022-26837</title>
<meta http-equiv="content-type" content="text/html; charset=UTF-8" />
<meta http-equiv="content-style-type" content="text/css" />
<meta http-equiv="content-script-type" content="text/javascript" />
<meta name="viewport" content="width=device-width, initial-scale=1.0" />
<link href="/site-scripts/font-awesome/css/font-awesome.min.css"
type="text/css" rel="stylesheet" />
<link href="/site-media/bootstrap/css/bootstrap.min.css"
type="text/css" rel="stylesheet" />
<link href="/site-media/bootstrap/css/bootstrap-theme.min.css"
type="text/css" rel="stylesheet" />
<link
href="/site-scripts/eonasdan-bootstrap-datetimepicker/build/css/bootstrap-datetimepicker.min.css"
type="text/css" rel="stylesheet" />
<link href="/site-media/css/nist-fonts.css" type="text/css"
rel="stylesheet" />
<link href="/site-media/css/base-style.css" type="text/css"
rel="stylesheet" />
<link href="/site-media/css/media-resize.css" type="text/css"
rel="stylesheet" />
<meta name="theme-color" content="#000000">
<script src="/site-scripts/jquery/dist/jquery.min.js"
type="text/javascript"></script>
<script src="/site-scripts/jquery-visible/jquery.visible.min.js"
type="text/javascript"></script>
<script src="/site-scripts/underscore/underscore-min.js"
type="text/javascript"></script>
<script src="/site-media/bootstrap/js/bootstrap.js"
type="text/javascript"></script>
<script src="/site-scripts/moment/min/moment.min.js"
type="text/javascript"></script>
<script
src="/site-scripts/eonasdan-bootstrap-datetimepicker/build/js/bootstrap-datetimepicker.min.js"
type="text/javascript"></script>
<script src="/site-media/js/megamenu.js" type="text/javascript"></script>
<script src="/site-media/js/nist-exit-script.js"
type="text/javascript"></script>
<script src="/site-media/js/forms.js" type="text/javascript"></script>
<script
src="/site-media/js/federated-analytics.all.min.js?agency=NIST&amp;subagency=nvd&amp;pua=UA-37115410-41&amp;yt=true"
type="text/javascript" id="_fed_an_js_tag"></script>
<!-- Google tag (gtag.js) -->
<script async src="https://www.googletagmanager.com/gtag/js?id=G-4KKFZP12LQ"></script>
<script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-4KKFZP12LQ'); </script>
<style id="antiClickjack">
body>* {
display: none !important;
}
#antiClickjack {
display: block !important;
}
</style>
<noscript>
<style id="antiClickjackNoScript">
body>* {
display: block !important;
}
#antiClickjack {
display: none !important;
}
</style>
</noscript>
<script type="text/javascript" id="antiClickjackScript">
if (self === top) {
// no clickjacking
var antiClickjack = document.getElementById("antiClickjack");
antiClickjack.parentNode.removeChild(antiClickjack);
} else {
setTimeout(tryForward(), 5000);
}
function tryForward() {
top.location = self.location;
}
</script>
<meta charset="UTF-8">
<link href="/site-media/css/nvd-style.css" type="text/css"
rel="stylesheet" />
<link href="/site-media/images/favicons/apple-touch-icon.png"
rel="apple-touch-icon" type="image/png" sizes="180x180" />
<link href="/site-media/images/favicons/favicon-32x32.png"
rel="icon" type="image/png" sizes="32x32" />
<link href="/site-media/images/favicons/favicon-16x16.png"
rel="icon" type="image/png" sizes="16x16" />
<link href="/site-media/images/favicons/manifest.json"
rel="manifest" />
<link href="/site-media/images/favicons/safari-pinned-tab.svg"
rel="mask-icon" color="#000000" />
<link href="/site-media/images/favicons/favicon.ico"
rel="shortcut icon" />
<meta name="msapplication-config" content="/site-media/images/favicons/browserconfig.xml" />
<link href="/site-media/images/favicons/favicon.ico"
rel="shortcut icon" type="image/x-icon" />
<link href="/site-media/images/favicons/favicon.ico" rel="icon"
type="image/x-icon" />
<meta charset="UTF-8">
<script src="/site-media/js/vulnerability/vulnDetail.js"
type="text/javascript"></script>
<script src="/site-media/js/vulnerability/cvssVulnDetail.js"
type="text/javascript"></script>
</head>
<body>
<header role="banner" title="Site Banner">
<div id="antiClickjack" style="display: none">
<h1>You are viewing this page in an unauthorized frame window.</h1>
<p>
This is a potential security issue, you are being redirected to
<a href="https://nvd.nist.gov">https://nvd.nist.gov</a>
</p>
</div>
<div>
<section class="usa-banner" aria-label="Official government website">
<div class="usa-accordion container">
<header class="usa-banner__header">
<noscript>
<p style="font-size: 0.85rem; font-weight: bold;">You have JavaScript disabled. This site requires JavaScript to be enabled for complete site functionality.</p>
</noscript>
<img class="usa-banner__header-flag"
src="/site-media/images/usbanner/us_flag_small.png" alt="U.S. flag">
&nbsp;
<span class="usa-banner__header-text">An official website of the United States government</span>
<button id="gov-banner-button" class="usa-accordion__button usa-banner__button" data-toggle="collapse" data-target="#gov-banner" aria-expanded="false" aria-controls="gov-banner">
<span class="usa-banner__button-text">Here's how you know</span>
</button>
</header>
<div class="usa-banner__content usa-accordion__content collapse" role="tabpanel" id="gov-banner" aria-expanded="true">
<div class="row">
<div class="col-md-5 col-sm-12">
<div class="row">
<div class="col-sm-2 col-xs-3">
<img class="usa-banner__icon usa-media-block__img"
src="/site-media/images/usbanner/icon-dot-gov.svg" alt="Dot gov">
</div>
<div class="col-sm-10 col-xs-9">
<p>
<strong>Official websites use .gov</strong>
<br>
A <strong>.gov</strong> website belongs to an official government organization in the United States.
</p>
</div>
</div>
</div>
<div class="col-md-5 col-sm-12">
<div class="row">
<div class="col-sm-2 col-xs-3">
<img class="usa-banner__icon usa-media-block__img"
src="/site-media/images/usbanner/icon-https.svg" alt="Https">
</div>
<div class="col-sm-10 col-xs-9">
<p>
<strong>Secure .gov websites use HTTPS</strong>
<br>
A <strong>lock</strong> (<img class="usa-banner__lock"
src="/site-media/images/usbanner/lock.svg" alt="Dot gov">) or <strong>https://</strong> means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.
</p>
</div>
</div>
</div>
</div>
</div>
</div>
</section>
</div>
<div>
<div>
<nav id="navbar" class="navbar">
<div id="nist-menu-container" class="container">
<div class="row">
<!-- Brand -->
<div class="col-xs-6 col-md-4 navbar-header"
style="height:104px">
<a class="navbar-brand"
href="https://www.nist.gov"
target="_blank" rel="noopener noreferrer"
id="navbar-brand-image"
style="padding-top: 36px">
<img alt="National Institute of Standards and Technology"
src="/site-media/images/nist/nist-logo.svg"
width="110" height="30">
</a>
</div>
<div class="col-xs-6 col-md-8 navbar-nist-logo">
<span id="nvd-menu-button" class="pull-right" style="margin-top: 26px"> <a href="#">
<span class="fa fa-bars"></span> <span id="nvd-menu-full-text"><span
class="hidden-xxs">NVD </span>MENU</span>
</a>
</span>
</div>
</div>
</div>
<div class="main-menu-row container">
<!-- Collect the nav links, forms, and other content for toggling -->
<div id="main-menu-drop" class="col-lg-12" style="display: none;">
<ul>
<li><a href="/general"> General <span
class="expander fa fa-plus" id="nvd-header-menu-general"
data-expander-name="general" data-expanded="false"> <span
class="element-invisible">Expand or Collapse</span>
</span>
</a>
<div style="display: none;" class="sub-menu"
data-expander-trigger="general">
<div class="row">
<div class="col-lg-4">
<p>
<a href="/general/nvd-dashboard">NVD Dashboard</a>
</p>
<p>
<a href="https://www.nist.gov/itl/nvd">News and Status Updates</a>
</p>
</div>
<div class="col-lg-4">
<p>
<a href="/general/faq">FAQ</a>
</p>
</div>
<div class="col-lg-4">
<p>
<a href="/general/visualizations">Visualizations</a>
</p>
<p>
<a href="/general/legal-disclaimer">Legal Disclaimer</a>
</p>
</div>
</div>
</div></li>
<li><a href="/vuln"> Vulnerabilities <span
class="expander fa fa-plus"
id="nvd-header-menu-vulnerabilities"
data-expander-name="vulnerabilities" data-expanded="false">
<span class="element-invisible">Expand or Collapse</span>
</span>
</a>
<div style="display: none;" class="sub-menu"
data-expander-trigger="vulnerabilities">
<div class="row">
<div class="col-lg-4">
<p>
<a href="/vuln/search">Search &amp; Statistics</a>
</p>
<p>
<a href="/vuln/categories">Weakness Types</a>
</p>
</div>
<div class="col-lg-4">
<p>
<a href="/vuln/data-feeds">Legacy Data Feeds</a>
</p>
<p>
<a href="/vuln/vendor-comments">Vendor Comments</a>
</p>
</div>
<div class="col-lg-4">
<p>
<a href="/vuln/cvmap">CVMAP</a>
</p>
</div>
</div>
</div></li>
<li><a href="/vuln-metrics/cvss#"> Vulnerability Metrics <span
class="expander fa fa-plus" id="nvd-header-menu-metrics"
data-expander-name="metrics" data-expanded="false"> <span
class="element-invisible">Expand or Collapse</span>
</span>
</a>
<div style="display: none;" class="sub-menu"
data-expander-trigger="metrics">
<div class="row">
<div class="col-lg-4">
<p>
<a href="/vuln-metrics/cvss/v4-calculator">CVSS v4.0
Calculators</a>
</p>
</div>
<div class="col-lg-4">
<p>
<a href="/vuln-metrics/cvss/v3-calculator">CVSS v3.x
Calculators</a>
</p>
</div>
<div class="col-lg-4">
<p>
<a href="/vuln-metrics/cvss/v2-calculator">CVSS v2.0
Calculator</a>
</p>
</div>
</div>
</div></li>
<li><a href="/products"> Products <span
class="expander fa fa-plus" id="nvd-header-menu-products"
data-expander-name="products" data-expanded="false"> <span
class="element-invisible">Expand or Collapse</span>
</span>
</a>
<div style="display: none;" class="sub-menu"
data-expander-trigger="products">
<div class="row">
<div class="col-lg-4">
<p>
<a href="/products/cpe">CPE Dictionary</a>
</p>
<p>
<a href="/products/cpe/search">CPE Search</a>
</p>
</div>
<div class="col-lg-4">
<p>
<a href="/products/cpe/statistics">CPE Statistics</a>
</p>
<p>
<a href="/products/swid">SWID</a>
</p>
</div>
<div class="col-lg-4"></div>
</div>
</div></li>
<li>
<a href="/developers">Developers<span
class="expander fa fa-plus" id="nvd-header-menu-developers"
data-expander-name="developers" data-expanded="false"> <span
class="element-invisible">Expand or Collapse</span>
</span>
</a>
<div style="display: none;" class="sub-menu"
data-expander-trigger="developers">
<div class="row">
<div class="col-lg-4">
<p>
<a href="/developers/start-here">Start Here</a>
</p>
<p>
<a href="/developers/request-an-api-key">Request an API Key</a>
</p>
</div>
<div class="col-lg-4">
<p>
<a href="/developers/vulnerabilities">Vulnerabilities</a>
</p>
<p>
<a href="/developers/products">Products</a>
</p>
</div>
<div class="col-lg-4">
<p>
<a href="/developers/data-sources">Data Sources</a>
</p>
<p>
<a href="/developers/terms-of-use">Terms of Use</a>
</p>
</div>
</div>
</div>
</li>
<li><a href="/contact"> Contact NVD </a></li>
<li><a href="/other"> Other Sites <span
class="expander fa fa-plus" id="nvd-header-menu-othersites"
data-expander-name="otherSites" data-expanded="false"> <span
class="element-invisible">Expand or Collapse</span>
</span>
</a>
<div style="display: none;" class="sub-menu"
data-expander-trigger="otherSites">
<div class="row">
<div class="col-lg-4">
<p>
<a href="https://ncp.nist.gov">Checklist (NCP) Repository</a>
</p>
<p>
<a href="https://ncp.nist.gov/cce">Configurations (CCE)</a>
</p>
<p>
<a href="https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search">800-53 Controls</a>
</p>
</div>
<div class="col-lg-4">
<p>
<a
href="https://csrc.nist.gov/projects/scap-validation-program">SCAP
Validated Tools</a>
</p>
<p>
<a
href="https://csrc.nist.gov/projects/security-content-automation-protocol">SCAP</a>
</p>
</div>
<div class="col-lg-4">
<p>
<a
href="https://csrc.nist.gov/projects/united-states-government-configuration-baseline">USGCB</a>
</p>
</div>
</div>
</div></li>
<li><a href="/search"> Search <span
class="expander fa fa-plus" id="nvd-header-menu-search"
data-expander-name="search" data-expanded="false"> <span
class="element-invisible">Expand or Collapse</span>
</span>
</a>
<div style="display: none;" class="sub-menu"
data-expander-trigger="search">
<div class="row">
<div class="col-lg-4">
<p>
<a href="/vuln/search">Vulnerability Search</a>
</p>
</div>
<div class="col-lg-4">
<p>
<a href="/products/cpe/search">CPE Search</a>
</p>
</div>
</div>
</div></li>
</ul>
</div>
<!-- /#mobile-nav-container -->
</div>
</nav>
<section id="itl-header" class="has-menu">
<div class="container">
<div class="row">
<div class="col-sm-12 col-md-8">
<h2 class="hidden-xs hidden-sm">
<a href="https://www.nist.gov/itl" target="_blank" rel="noopener noreferrer">Information Technology Laboratory</a>
</h2>
<h1 class="hidden-xs hidden-sm">
<a id="nvd-header-link"
href="/">National Vulnerability Database</a>
</h1>
<h1 class="hidden-xs text-center hidden-md hidden-lg"
>National Vulnerability Database</h1>
<h1 class="hidden-sm hidden-md hidden-lg text-center"
>NVD</h1>
</div>
<div class="col-sm-12 col-md-4">
<a style="width: 100%; text-align: center; display: block;padding-top: 14px">
<img id="img-logo-nvd-lg"
alt="National Vulnerability Database"
src="/site-media/images/F_NIST-Logo-NVD-white.svg"
width="500" height="100">
</a>
</div>
</div>
</div>
</section>
</div>
</div>
</header>
<main>
<div>
<div id="body-section" class="container">
<div class="row">
<ol class="breadcrumb">
<li><a href="/vuln" class="CMSBreadCrumbsLink">Vulnerabilities</a></li>
</ol>
</div>
<div>
<style>
/* wrap the words for CVSS v4 */
#nistv4Metric {
word-wrap: break-word;
}
</style>
<script>
/*<![CDATA[*/
var vuln = {
nistV4Present: false,
cnaV4Present: false,
nistV3Present: true,
cnaV3Present: true,
nistV2Present: false,
cnaV2Present: false
};
/*]]>*/
</script>
<div>
</div>
<div id="vulnDetailPanel">
<table id="vulnDetailTableView" style="border-collapse: collapse;">
<tr>
<td colspan="2">
<h2 data-testid="page-header">
<i class="fa fa-bug fa-flip-vertical"></i><span
data-testid="page-header-vuln-id">CVE-2022-26837</span>
Detail
</h2>
<div class="row">
<div class="col-lg-9 col-md-7 col-sm-12">
<div id="vulnShowWarningDiv"
data-testid="vuln-warning-container">
<div
role="alert" data-testid="vuln-warning-alert-container" class="bs-callout bs-callout-info">
<strong class="h4Size"><span
data-testid="vuln-warning-status-name">Modified</span></strong>
<hr/>
<p data-testid="vuln-warning-banner-content">This CVE record has been updated after NVD enrichment efforts were completed. Enrichment data supplied by the NVD may require amendment due to these changes.</p>
</div>
</div>
<h3 id="vulnDescriptionTitle"
data-testid="vuln-description-title">Description </h3>
<p data-testid="vuln-description">Improper input validation in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.</p><br/>
<!-- CVSS Severity and Vector Strings -->
<div id="vulnCvssPanel" data-testid="vuln-cvss-container"
class="row bs-callout bs-callout-success cvssVulnDetail">
<h3 style="display: inline" title="CVSS is not a measure of risk">Metrics</h3>
&ensp;
<div id="cvssVulnDetailBtn" class="btn-group">
<button id="btn-cvss4" type="button" title="Click here to view CVSS 4.0 data"
class="btn default btn-lg cvssBtn">CVSS Version 4.0
</button>
<button id="btn-cvss3" type="button" title="Click here to view CVSS 3.x data"
class="btn default btn-lg cvssBtn">CVSS Version 3.x
</button>
<button id="btn-cvss2" type="button" title="Click here to view CVSS 2.0 data"
class="btn default btn-lg cvssBtn">CVSS Version 2.0
</button>
</div>
<div id="cvssEnrichmentNotes">
<i>
<small>
NVD enrichment efforts reference publicly available information to associate
vector strings. CVSS information contributed by other sources is also
displayed.
</small>
</i>
</div>
<!-- CVSS v4.0 -->
<div class="container-fluid" id="Vuln4CvssPanel" data-testid="vuln-cvss4-panel">
<strong>CVSS 4.0 Severity and Vector Strings:</strong>
<!-- NIST -->
<div class="row no-gutters">
<br/>
<div class="col-lg-3 col-sm-6">
<div class="row">
<div class="col-lg-3 col-sm-6">
<img
src="/site-media/images/NVD_NVD_Stack_Plain.svg"
class="cvssNvdIcon" alt="NIST CVSS score">
</div>
<div class="col-lg-9 col-sm-6">
<strong>NIST:</strong>&nbsp;<span class="wrapData"
data-testid="vuln-cvss4-source-nvd">NVD</span>
</div>
</div>
</div>
<div class="col-lg-3 col-sm-6">
<span><strong> </strong><span
class="severityDetail"> <a
id="Cvss4NistCalculatorAnchorNA"
class="label label-default"
data-testid="vuln-cvss4-panel-score-na">N/A</a></span></span>
</div>
<div class="col-lg-6 col-sm-12">
<span> <span
data-testid="vuln-cvss4-nist-vector-na">NVD assessment
not yet provided.</span></span> <input type="hidden"
id="nistV4MetricHidden"
value=""/>
</div>
</div>
<!-- CNA -->
<!-- ADP -->
</div>
<!-- CVSS V3.x -->
<div class="container-fluid" id="Vuln3CvssPanel" data-testid="vuln-cvss3-panel"
style="display: none;">
<strong>CVSS 3.x Severity and Vector Strings:</strong>
<!-- NIST -->
<div class="row no-gutters">
<br/>
<div class="col-lg-3 col-sm-6">
<div class="row">
<div class="col-lg-3 col-sm-6">
<img
src="/site-media/images/NVD_NVD_Stack_Plain.svg"
class="cvssNvdIcon" alt="NIST CVSS score">
</div>
<div class="col-lg-9 col-sm-6">
<strong>NIST:</strong>&nbsp;<span class="wrapData"
data-testid="vuln-cvss3-source-nvd">NVD</span>
</div>
</div>
</div>
<div class="col-lg-3 col-sm-6">
<span><strong>Base
Score:</strong>&nbsp;<span class="severityDetail"> <a
id="Cvss3NistCalculatorAnchor"
href="/vuln-metrics/cvss/v3-calculator?name=CVE-2022-26837&amp;vector=AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H&amp;version=3.1&amp;source=NIST"
data-testid="vuln-cvss3-panel-score"
class="label label-danger">7.0 HIGH</a>
</span></span>
</div>
<div class="col-lg-6 col-sm-12">
<span><strong>Vector:</strong>&nbsp;
<span data-testid="vuln-cvss3-nist-vector"
class="tooltipCvss3NistMetrics">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span></span>
<input type="hidden"
id="nistV3MetricHidden"
value="&lt;span id = &#39;nistV3Metric&#39; style = &#39;display:none&#39; &gt; &lt;strong style =&#39;font-size:1.2em&#39; &gt; CVSS v3.1 Severity and Metrics:&lt;/strong&gt; &lt;p data-testid=&#39;vuln-cvssv3-score-container&#39;&gt; &lt;strong&gt;Base Score: &lt;/strong&gt; &lt;span data-testid=&#39;vuln-cvssv3-base-score&#39;&gt;7.0 &lt;/span&gt;&lt;span data-testid=&#39;vuln-cvssv3-base-score-severity&#39;&gt;HIGH&lt;/span&gt; &lt;br /&gt; &lt;strong&gt;Vector: &lt;/strong&gt; &lt;span data-testid=&#39;vuln-cvssv3-vector&#39;&gt; AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H &lt;/span&gt; &lt;br /&gt; &lt;strong&gt;Impact Score: &lt;/strong&gt; &lt;span data-testid=&#39;vuln-cvssv3-impact-score&#39;&gt; 5.9 &lt;/span&gt; &lt;br /&gt; &lt;strong&gt;Exploitability Score: &lt;/strong&gt; &lt;span data-testid=&#39;vuln-cvssv3-exploitability-score&#39;&gt; 1.0 &lt;/span&gt; &lt;/p&gt; &lt;hr /&gt; &lt;p data-testid=&#39;vuln-cvssv3-metrics-container&#39;&gt; &lt;strong&gt;Attack Vector (AV): &lt;/strong&gt; &lt;span data-testid=&#39;vuln-cvssv3-av&#39;&gt; Local &lt;/span&gt; &lt;br /&gt; &lt;strong&gt;Attack Complexity (AC): &lt;/strong&gt; &lt;span data-testid=&#39;vuln-cvssv3-ac&#39;&gt; High &lt;/span&gt; &lt;br /&gt; &lt;strong&gt;Privileges Required (PR): &lt;/strong&gt; &lt;span data-testid=&#39;vuln-cvssv3-pr&#39;&gt; Low &lt;/span&gt; &lt;br /&gt; &lt;strong&gt;User Interaction (UI): &lt;/strong&gt; &lt;span data-testid=&#39;vuln-cvssv3-ui&#39;&gt; None &lt;/span&gt; &lt;br /&gt; &lt;strong&gt;Scope (S): &lt;/strong&gt; &lt;span data-testid=&#39;vuln-cvssv3-s&#39;&gt; Unchanged &lt;/span&gt; &lt;br /&gt; &lt;strong&gt;Confidentiality (C): &lt;/strong&gt; &lt;span data-testid=&#39;vuln-cvssv3-c&#39;&gt; High &lt;/span&gt; &lt;br /&gt; &lt;strong&gt;Integrity (I): &lt;/strong&gt; &lt;span data-testid=&#39;vuln-cvssv3-i&#39;&gt; High &lt;/span&gt; &lt;br /&gt; &lt;strong&gt;Availability (A): &lt;/strong&gt; &lt;span data-testid=&#39;vuln-cvssv3-a&#39;&gt; High &lt;/span&gt; &lt;/p&gt; &lt;/span&gt; "/>
</div>
</div>
<!-- CNA -->
<div class="row no-gutters">
<br/>
<div class="col-lg-3 col-sm-6">
<div class="row">
<div class="col-lg-3 col-sm-6">
<div id="v3CnaIconContributor">
<img src="/site-media/images/NVD_Contributor_Stack_Plain.svg"
class="cvssNvdIcon"
alt="Nist CVSS score does not match with CNA score">
</div>
</div>
<div class="col-lg-9 col-sm-6">
<strong>CNA:</strong>&nbsp; <span class="wrapData"
data-testid="vuln-cvss3-source-cna">Intel Corporation</span>
</div>
</div>
</div>
<div class="col-lg-3 col-sm-6">
<span><strong>Base
Score:</strong>&nbsp;<span class="severityDetail"> <a
id="Cvss3CnaCalculatorAnchor"
href="/vuln-metrics/cvss/v3-calculator?name=CVE-2022-26837&amp;vector=AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H&amp;version=3.1&amp;source=Intel%20Corporation"
data-testid="vuln-cvss3-cna-panel-score"
class="label label-danger">7.5 HIGH</a></span></span>
</div>
<div class="col-lg-6 col-sm-12">
<span><strong>Vector:</strong>&nbsp; <span
data-testid="vuln-cvss3-cna-vector"
class="tooltipCvss3CnaMetrics">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H</span></span>
<input type="hidden" id="cnaV3MetricHidden"
value="&lt;span id = &#39;nistV3Metric&#39; style = &#39;display:none&#39; &gt; &lt;strong style =&#39;font-size:1.2em&#39; &gt; CVSS v3.1 Severity and Metrics:&lt;/strong&gt; &lt;p data-testid=&#39;vuln-cvssv3-score-container&#39;&gt; &lt;strong&gt;Base Score: &lt;/strong&gt; &lt;span data-testid=&#39;vuln-cvssv3-base-score&#39;&gt;7.5 &lt;/span&gt;&lt;span data-testid=&#39;vuln-cvssv3-base-score-severity&#39;&gt;HIGH&lt;/span&gt; &lt;br /&gt; &lt;strong&gt;Vector: &lt;/strong&gt; &lt;span data-testid=&#39;vuln-cvssv3-vector&#39;&gt; AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H &lt;/span&gt; &lt;br /&gt; &lt;strong&gt;Impact Score: &lt;/strong&gt; &lt;span data-testid=&#39;vuln-cvssv3-impact-score&#39;&gt; 6.0 &lt;/span&gt; &lt;br /&gt; &lt;strong&gt;Exploitability Score: &lt;/strong&gt; &lt;span data-testid=&#39;vuln-cvssv3-exploitability-score&#39;&gt; 0.8 &lt;/span&gt; &lt;/p&gt; &lt;hr /&gt; &lt;p data-testid=&#39;vuln-cvssv3-metrics-container&#39;&gt; &lt;strong&gt;Attack Vector (AV): &lt;/strong&gt; &lt;span data-testid=&#39;vuln-cvssv3-av&#39;&gt; Local &lt;/span&gt; &lt;br /&gt; &lt;strong&gt;Attack Complexity (AC): &lt;/strong&gt; &lt;span data-testid=&#39;vuln-cvssv3-ac&#39;&gt; High &lt;/span&gt; &lt;br /&gt; &lt;strong&gt;Privileges Required (PR): &lt;/strong&gt; &lt;span data-testid=&#39;vuln-cvssv3-pr&#39;&gt; High &lt;/span&gt; &lt;br /&gt; &lt;strong&gt;User Interaction (UI): &lt;/strong&gt; &lt;span data-testid=&#39;vuln-cvssv3-ui&#39;&gt; None &lt;/span&gt; &lt;br /&gt; &lt;strong&gt;Scope (S): &lt;/strong&gt; &lt;span data-testid=&#39;vuln-cvssv3-s&#39;&gt; Changed &lt;/span&gt; &lt;br /&gt; &lt;strong&gt;Confidentiality (C): &lt;/strong&gt; &lt;span data-testid=&#39;vuln-cvssv3-c&#39;&gt; High &lt;/span&gt; &lt;br /&gt; &lt;strong&gt;Integrity (I): &lt;/strong&gt; &lt;span data-testid=&#39;vuln-cvssv3-i&#39;&gt; High &lt;/span&gt; &lt;br /&gt; &lt;strong&gt;Availability (A): &lt;/strong&gt; &lt;span data-testid=&#39;vuln-cvssv3-a&#39;&gt; High &lt;/span&gt; &lt;/p&gt; &lt;/span&gt; "/>
</div>
</div>
<!-- ADP -->
<!-- <div id="cvss3FootNote" class="cvssFootNote" >-->
<!-- <br/><br/>-->
<!-- <span id = "cvss3FootNoteSection" th:utext="${cvssData.cvss3FootNoteHtml}"></span>-->
<!-- </div>-->
</div>
<!-- CVSS V2.0 -->
<div class="container-fluid" id="Vuln2CvssPanel" data-testid="vuln-cvss2-panel"
style="display: none;">
<strong>CVSS 2.0 Severity and Vector Strings:</strong> <br/> <br/>
<!-- NIST -->
<div class="row no-gutters">
<div class="col-lg-3 col-sm-6">
<div class="row">
<div class="col-lg-3 col-sm-6">
<img
src="/site-media/images/NVD_NVD_Stack_Plain.svg"
class="cvssNvdIcon"
alt="National Institute of Standards and Technology">
</div>
<div class="col-lg-9 col-sm-6">
<strong>NIST:</strong>&nbsp;<span
data-testid="vuln-cvss2-source-nvd">NVD</span>
</div>
</div>
</div>
<div class="col-lg-3 col-sm-6">
<span><strong>Base
Score:</strong>&nbsp;<span class="severityDetail"><a
id="Cvss2CalculatorAnchorNA" class="label label-default"
data-testid="vuln-cvss2-panel-score-na"
href=''>N/A</a></span></span>
</div>
<div class="col-lg-6 col-sm-12">
<span><span
data-testid="vuln-cvss2-panel-vector-na">NVD assessment
not yet provided.</span></span> <input type="hidden"
id="nistV2MetricHidden"
value=""/>
</div>
</div>
<!-- CNA -->
<!-- ADP -->
<!-- <div id = "cvss2FootNote" class="cvssFootNote" >-->
<!-- <br/><br/>-->
<!-- <span id = "cvss2FootNoteSection" th:utext="${cvssData.cvss2FootNoteHtml}"></span>-->
<!-- </div>-->
</div>
</div>
<div class="row col-sm-12">
<div id="vulnHyperlinksPanel">
<h3>References to Advisories, Solutions, and Tools</h3>
<p>
By selecting these links, you will be leaving NIST webspace.
We have provided these links to other web sites because they
may have information that would be of interest to you. No
inferences should be drawn on account of other sites being
referenced, or not, from this page. There may be other web
sites that are more appropriate for your purpose. NIST does
not necessarily endorse the views expressed, or concur with
the facts presented on these sites. Further, NIST does not
endorse any commercial products that may be mentioned on
these sites. Please address comments about this page to <a
href="mailto:nvd@nist.gov">nvd@nist.gov</a>.
</p>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-hyperlinks-table">
<thead>
<tr>
<th>Hyperlink</th>
<th>Resource</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-hyperlinks-row-0">
<td data-testid="vuln-hyperlinks-link-0">
<a
href="http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00717.html"
target="_blank" rel="noopener noreferrer">http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00717.html</a></td>
<td data-testid="vuln-hyperlinks-resType-0">
<span>
<span class="badge">Vendor Advisory</span>&nbsp;
</span>
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-1">
<td data-testid="vuln-hyperlinks-link-1">
<a
href="http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00717.html"
target="_blank" rel="noopener noreferrer">http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00717.html</a></td>
<td data-testid="vuln-hyperlinks-resType-1">
<span>
<span class="badge">Vendor Advisory</span>&nbsp;
</span>
</td>
</tr>
</tbody>
</table>
</div>
<div id="vulnTechnicalDetailsDiv" class="technicalDetails"
data-testid="vuln-technical-details-container">
<h3>Weakness Enumeration</h3>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-CWEs-table">
<thead>
<tr>
<th>CWE-ID</th>
<th>CWE Name</th>
<th>Source</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-CWEs-row-0">
<td data-testid="vuln-CWEs-link-0">
<a href="http://cwe.mitre.org/data/definitions/20.html" target="_blank" rel="noopener noreferrer">CWE-20</a>
</td>
<td
data-testid="vuln-CWEs-link-0">Improper Input Validation</td>
<td data-testid="vuln-cwes-assigner-0">
<span class="cweSource" data-testid="vuln-cwes-assigner-0-0"
>
<img src="/site-media/images/NVD_NVD_Stack_Plain.svg"
class="cweNvdIcon"
alt="cwe source acceptance level">
<span>NIST</span>
</span>
</td>
</tr>
</tbody>
</table>
</div>
<div>
<h3>
Known Affected Software Configurations <small> <a
id="toggleCpeVersion" href="#vulnConfigurationsArea">Switch
to CPE 2.2</a></small>
</h3>
<span id="vulnConfigurationsArea"></span>
<input type="hidden" id="cveIdHidden" value="CVE-2022-26837"/>
<div>
<div id="vulnCpeTreeLoading"><h3>CPEs loading, please wait.</h3></div>
<div id="vulnCpeTree" style="display: none;"></div>
<input type="hidden"
id="InputRestBasePath"
value="/rest/public">
<input type="hidden" id="cveTreeJsonDataHidden" value="[{&quot;id&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-config-1&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-1-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-1-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_gold_5317_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_gold_5317_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_gold_5317_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-0-0&quot;,&quot;id&quot;:&quot;15559990&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-1-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_gold_5317%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_gold_5317:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_gold_5317:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-1-0&quot;,&quot;id&quot;:&quot;15559991&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-config-2&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-2-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-2-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_gold_5318n_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_gold_5318n_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_gold_5318n_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-0-0&quot;,&quot;id&quot;:&quot;15559992&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-2-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_gold_5318n%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_gold_5318n:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_gold_5318n:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-1-0&quot;,&quot;id&quot;:&quot;15559993&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:3,&quot;dataTestId&quot;:&quot;vuln-software-config-3&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-3-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-3-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_gold_5318s_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_gold_5318s_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_gold_5318s_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-3-0-0-0&quot;,&quot;id&quot;:&quot;15559994&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-3-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_gold_5318s%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_gold_5318s:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_gold_5318s:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-3-0-1-0&quot;,&quot;id&quot;:&quot;15559995&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:4,&quot;dataTestId&quot;:&quot;vuln-software-config-4&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-4-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-4-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_gold_5318y_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_gold_5318y_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_gold_5318y_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-4-0-0-0&quot;,&quot;id&quot;:&quot;15559996&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-4-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_gold_5318y%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_gold_5318y:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_gold_5318y:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-4-0-1-0&quot;,&quot;id&quot;:&quot;15559997&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:5,&quot;dataTestId&quot;:&quot;vuln-software-config-5&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-5-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-5-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_gold_5320_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_gold_5320_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_gold_5320_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-5-0-0-0&quot;,&quot;id&quot;:&quot;15559998&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-5-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_gold_5320%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_gold_5320:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_gold_5320:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-5-0-1-0&quot;,&quot;id&quot;:&quot;15559999&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:6,&quot;dataTestId&quot;:&quot;vuln-software-config-6&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-6-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-6-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_gold_5320t_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_gold_5320t_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_gold_5320t_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-6-0-0-0&quot;,&quot;id&quot;:&quot;15560000&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-6-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_gold_5320t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_gold_5320t:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_gold_5320t:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-6-0-1-0&quot;,&quot;id&quot;:&quot;15560001&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:7,&quot;dataTestId&quot;:&quot;vuln-software-config-7&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-7-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-7-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_gold_6312u_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_gold_6312u_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_gold_6312u_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-7-0-0-0&quot;,&quot;id&quot;:&quot;15560002&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-7-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_gold_6312u%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_gold_6312u:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_gold_6312u:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-7-0-1-0&quot;,&quot;id&quot;:&quot;15560003&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:8,&quot;dataTestId&quot;:&quot;vuln-software-config-8&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-8-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-8-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_gold_6314u_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_gold_6314u_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_gold_6314u_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-8-0-0-0&quot;,&quot;id&quot;:&quot;15560004&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-8-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_gold_6314u%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_gold_6314u:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_gold_6314u:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-8-0-1-0&quot;,&quot;id&quot;:&quot;15560005&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:9,&quot;dataTestId&quot;:&quot;vuln-software-config-9&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-9-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-9-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_gold_6326_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_gold_6326_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_gold_6326_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-0-0&quot;,&quot;id&quot;:&quot;15560006&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-9-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_gold_6326%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_gold_6326:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_gold_6326:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-1-0&quot;,&quot;id&quot;:&quot;15560007&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:10,&quot;dataTestId&quot;:&quot;vuln-software-config-10&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-10-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-10-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_gold_6330_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_gold_6330_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_gold_6330_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-10-0-0-0&quot;,&quot;id&quot;:&quot;15560008&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-10-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_gold_6330%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_gold_6330:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_gold_6330:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-10-0-1-0&quot;,&quot;id&quot;:&quot;15560009&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:11,&quot;dataTestId&quot;:&quot;vuln-software-config-11&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-11-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-11-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_gold_6330n_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_gold_6330n_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_gold_6330n_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-0-0&quot;,&quot;id&quot;:&quot;15560010&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-11-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_gold_6330n%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_gold_6330n:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_gold_6330n:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-1-0&quot;,&quot;id&quot;:&quot;15560011&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:12,&quot;dataTestId&quot;:&quot;vuln-software-config-12&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-12-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-12-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_gold_6334_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_gold_6334_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_gold_6334_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-12-0-0-0&quot;,&quot;id&quot;:&quot;15560012&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-12-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_gold_6334%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_gold_6334:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_gold_6334:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-12-0-1-0&quot;,&quot;id&quot;:&quot;15560013&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:13,&quot;dataTestId&quot;:&quot;vuln-software-config-13&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-13-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-13-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_gold_6336y_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_gold_6336y_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_gold_6336y_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-13-0-0-0&quot;,&quot;id&quot;:&quot;15560014&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-13-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_gold_6336y%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_gold_6336y:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_gold_6336y:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-13-0-1-0&quot;,&quot;id&quot;:&quot;15560015&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:14,&quot;dataTestId&quot;:&quot;vuln-software-config-14&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-14-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-14-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_gold_6338_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_gold_6338_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_gold_6338_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-14-0-0-0&quot;,&quot;id&quot;:&quot;15560016&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-14-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_gold_6338%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_gold_6338:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_gold_6338:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-14-0-1-0&quot;,&quot;id&quot;:&quot;15560017&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:15,&quot;dataTestId&quot;:&quot;vuln-software-config-15&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-15-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-15-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_gold_6338n_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_gold_6338n_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_gold_6338n_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-15-0-0-0&quot;,&quot;id&quot;:&quot;15560018&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-15-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_gold_6338n%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_gold_6338n:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_gold_6338n:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-15-0-1-0&quot;,&quot;id&quot;:&quot;15560019&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:16,&quot;dataTestId&quot;:&quot;vuln-software-config-16&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-16-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-16-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_gold_6338t_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_gold_6338t_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_gold_6338t_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-16-0-0-0&quot;,&quot;id&quot;:&quot;15560020&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-16-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_gold_6338t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_gold_6338t:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_gold_6338t:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-16-0-1-0&quot;,&quot;id&quot;:&quot;15560021&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:17,&quot;dataTestId&quot;:&quot;vuln-software-config-17&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-17-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-17-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_gold_6342_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_gold_6342_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_gold_6342_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-17-0-0-0&quot;,&quot;id&quot;:&quot;15560022&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-17-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_gold_6342%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_gold_6342:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_gold_6342:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-17-0-1-0&quot;,&quot;id&quot;:&quot;15560023&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:18,&quot;dataTestId&quot;:&quot;vuln-software-config-18&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-18-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-18-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_gold_6346_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_gold_6346_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_gold_6346_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-18-0-0-0&quot;,&quot;id&quot;:&quot;15560024&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-18-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_gold_6346%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_gold_6346:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_gold_6346:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-18-0-1-0&quot;,&quot;id&quot;:&quot;15560025&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:19,&quot;dataTestId&quot;:&quot;vuln-software-config-19&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-19-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-19-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_gold_6348_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_gold_6348_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_gold_6348_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-19-0-0-0&quot;,&quot;id&quot;:&quot;15560026&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-19-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_gold_6348%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_gold_6348:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_gold_6348:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-19-0-1-0&quot;,&quot;id&quot;:&quot;15560027&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:20,&quot;dataTestId&quot;:&quot;vuln-software-config-20&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-20-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-20-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_gold_6354_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_gold_6354_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_gold_6354_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-20-0-0-0&quot;,&quot;id&quot;:&quot;15560028&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-20-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_gold_6354%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_gold_6354:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_gold_6354:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-20-0-1-0&quot;,&quot;id&quot;:&quot;15560029&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:21,&quot;dataTestId&quot;:&quot;vuln-software-config-21&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-21-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-21-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_platinum_8351n_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_platinum_8351n_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_platinum_8351n_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-21-0-0-0&quot;,&quot;id&quot;:&quot;15560030&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-21-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_platinum_8351n%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_platinum_8351n:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_platinum_8351n:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-21-0-1-0&quot;,&quot;id&quot;:&quot;15560031&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:22,&quot;dataTestId&quot;:&quot;vuln-software-config-22&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-22-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-22-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_platinum_8352m_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_platinum_8352m_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_platinum_8352m_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-22-0-0-0&quot;,&quot;id&quot;:&quot;15560032&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-22-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_platinum_8352m%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_platinum_8352m:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_platinum_8352m:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-22-0-1-0&quot;,&quot;id&quot;:&quot;15560033&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:23,&quot;dataTestId&quot;:&quot;vuln-software-config-23&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-23-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-23-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_platinum_8352s_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_platinum_8352s_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_platinum_8352s_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-23-0-0-0&quot;,&quot;id&quot;:&quot;15560034&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-23-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_platinum_8352s%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_platinum_8352s:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_platinum_8352s:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-23-0-1-0&quot;,&quot;id&quot;:&quot;15560035&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:24,&quot;dataTestId&quot;:&quot;vuln-software-config-24&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-24-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-24-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_platinum_8352v_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_platinum_8352v_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_platinum_8352v_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-24-0-0-0&quot;,&quot;id&quot;:&quot;15560036&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-24-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_platinum_8352v%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_platinum_8352v:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_platinum_8352v:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-24-0-1-0&quot;,&quot;id&quot;:&quot;15560037&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:25,&quot;dataTestId&quot;:&quot;vuln-software-config-25&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-25-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-25-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_platinum_8352y_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_platinum_8352y_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_platinum_8352y_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-25-0-0-0&quot;,&quot;id&quot;:&quot;15560038&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-25-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_platinum_8352y%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_platinum_8352y:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_platinum_8352y:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-25-0-1-0&quot;,&quot;id&quot;:&quot;15560039&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:26,&quot;dataTestId&quot;:&quot;vuln-software-config-26&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-26-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-26-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_platinum_8358_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_platinum_8358_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_platinum_8358_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-26-0-0-0&quot;,&quot;id&quot;:&quot;15560040&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-26-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_platinum_8358%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_platinum_8358:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_platinum_8358:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-26-0-1-0&quot;,&quot;id&quot;:&quot;15560041&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:27,&quot;dataTestId&quot;:&quot;vuln-software-config-27&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-27-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-27-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_platinum_8358p_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_platinum_8358p_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_platinum_8358p_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-27-0-0-0&quot;,&quot;id&quot;:&quot;15560042&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-27-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_platinum_8358p%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_platinum_8358p:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_platinum_8358p:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-27-0-1-0&quot;,&quot;id&quot;:&quot;15560043&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:28,&quot;dataTestId&quot;:&quot;vuln-software-config-28&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-28-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-28-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_platinum_8360y_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_platinum_8360y_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_platinum_8360y_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-28-0-0-0&quot;,&quot;id&quot;:&quot;15560044&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-28-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_platinum_8360y%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_platinum_8360y:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_platinum_8360y:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-28-0-1-0&quot;,&quot;id&quot;:&quot;15560045&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:29,&quot;dataTestId&quot;:&quot;vuln-software-config-29&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-29-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-29-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_platinum_8362_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_platinum_8362_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_platinum_8362_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-29-0-0-0&quot;,&quot;id&quot;:&quot;15560046&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-29-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_platinum_8362%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_platinum_8362:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_platinum_8362:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-29-0-1-0&quot;,&quot;id&quot;:&quot;15560047&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:30,&quot;dataTestId&quot;:&quot;vuln-software-config-30&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-30-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-30-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_platinum_8368_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_platinum_8368_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_platinum_8368_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-30-0-0-0&quot;,&quot;id&quot;:&quot;15560048&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-30-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_platinum_8368%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_platinum_8368:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_platinum_8368:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-30-0-1-0&quot;,&quot;id&quot;:&quot;15560049&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:31,&quot;dataTestId&quot;:&quot;vuln-software-config-31&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-31-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-31-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_platinum_8368q_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_platinum_8368q_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_platinum_8368q_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-31-0-0-0&quot;,&quot;id&quot;:&quot;15560050&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-31-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_platinum_8368q%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_platinum_8368q:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_platinum_8368q:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-31-0-1-0&quot;,&quot;id&quot;:&quot;15560051&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:32,&quot;dataTestId&quot;:&quot;vuln-software-config-32&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-32-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-32-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_platinum_8380_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_platinum_8380_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_platinum_8380_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-32-0-0-0&quot;,&quot;id&quot;:&quot;15560052&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-32-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_platinum_8380%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_platinum_8380:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_platinum_8380:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-32-0-1-0&quot;,&quot;id&quot;:&quot;15560053&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:33,&quot;dataTestId&quot;:&quot;vuln-software-config-33&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-33-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-33-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_silver_4309y_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_silver_4309y_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_silver_4309y_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-33-0-0-0&quot;,&quot;id&quot;:&quot;15560054&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-33-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_silver_4309y%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_silver_4309y:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_silver_4309y:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-33-0-1-0&quot;,&quot;id&quot;:&quot;15560055&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:34,&quot;dataTestId&quot;:&quot;vuln-software-config-34&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-34-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-34-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_silver_4310_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_silver_4310_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_silver_4310_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-34-0-0-0&quot;,&quot;id&quot;:&quot;15560056&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-34-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_silver_4310%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_silver_4310:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_silver_4310:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-34-0-1-0&quot;,&quot;id&quot;:&quot;15560057&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:35,&quot;dataTestId&quot;:&quot;vuln-software-config-35&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-35-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-35-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_silver_4310t_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_silver_4310t_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_silver_4310t_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-35-0-0-0&quot;,&quot;id&quot;:&quot;15560058&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-35-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_silver_4310t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_silver_4310t:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_silver_4310t:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-35-0-1-0&quot;,&quot;id&quot;:&quot;15560059&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:36,&quot;dataTestId&quot;:&quot;vuln-software-config-36&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-36-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-36-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_silver_4314_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_silver_4314_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_silver_4314_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-36-0-0-0&quot;,&quot;id&quot;:&quot;15560060&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-36-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_silver_4314%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_silver_4314:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_silver_4314:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-36-0-1-0&quot;,&quot;id&quot;:&quot;15560061&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:37,&quot;dataTestId&quot;:&quot;vuln-software-config-37&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-37-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-37-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_silver_4316_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_silver_4316_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_silver_4316_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-37-0-0-0&quot;,&quot;id&quot;:&quot;15560062&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-37-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_silver_4316%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_silver_4316:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_silver_4316:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-37-0-1-0&quot;,&quot;id&quot;:&quot;15560063&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:38,&quot;dataTestId&quot;:&quot;vuln-software-config-38&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-38-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-38-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_gold_6330h_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_gold_6330h_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_gold_6330h_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-38-0-0-0&quot;,&quot;id&quot;:&quot;15560064&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-38-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_gold_6330h%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_gold_6330h:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_gold_6330h:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-38-0-1-0&quot;,&quot;id&quot;:&quot;15560065&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:39,&quot;dataTestId&quot;:&quot;vuln-software-config-39&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-39-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-39-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_platinum_8356h_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_platinum_8356h_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_platinum_8356h_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-39-0-0-0&quot;,&quot;id&quot;:&quot;15560066&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-39-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_platinum_8356h%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_platinum_8356h:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_platinum_8356h:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-39-0-1-0&quot;,&quot;id&quot;:&quot;15560067&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:40,&quot;dataTestId&quot;:&quot;vuln-software-config-40&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-40-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-40-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_platinum_8360h_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_platinum_8360h_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_platinum_8360h_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-40-0-0-0&quot;,&quot;id&quot;:&quot;15560068&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-40-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_platinum_8360h%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_platinum_8360h:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_platinum_8360h:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-40-0-1-0&quot;,&quot;id&quot;:&quot;15560069&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:41,&quot;dataTestId&quot;:&quot;vuln-software-config-41&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-41-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-41-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_platinum_8360hl_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_platinum_8360hl_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_platinum_8360hl_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-41-0-0-0&quot;,&quot;id&quot;:&quot;15560070&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-41-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_platinum_8360hl%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_platinum_8360hl:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_platinum_8360hl:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-41-0-1-0&quot;,&quot;id&quot;:&quot;15560071&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:42,&quot;dataTestId&quot;:&quot;vuln-software-config-42&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-42-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-42-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_gold_5318h_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_gold_5318h_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_gold_5318h_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-42-0-0-0&quot;,&quot;id&quot;:&quot;15560072&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-42-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_gold_5318h%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_gold_5318h:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_gold_5318h:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-42-0-1-0&quot;,&quot;id&quot;:&quot;15560073&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:43,&quot;dataTestId&quot;:&quot;vuln-software-config-43&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-43-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-43-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_gold_5320h_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_gold_5320h_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_gold_5320h_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-43-0-0-0&quot;,&quot;id&quot;:&quot;15560074&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-43-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_gold_5320h%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_gold_5320h:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_gold_5320h:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-43-0-1-0&quot;,&quot;id&quot;:&quot;15560075&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:44,&quot;dataTestId&quot;:&quot;vuln-software-config-44&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-44-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-44-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_gold_6328h_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_gold_6328h_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_gold_6328h_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-44-0-0-0&quot;,&quot;id&quot;:&quot;15560076&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-44-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_gold_6328h%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_gold_6328h:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_gold_6328h:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-44-0-1-0&quot;,&quot;id&quot;:&quot;15560077&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:45,&quot;dataTestId&quot;:&quot;vuln-software-config-45&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-45-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-45-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_gold_6328hl_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_gold_6328hl_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_gold_6328hl_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-45-0-0-0&quot;,&quot;id&quot;:&quot;15560078&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-45-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_gold_6328hl%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_gold_6328hl:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_gold_6328hl:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-45-0-1-0&quot;,&quot;id&quot;:&quot;15560079&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:46,&quot;dataTestId&quot;:&quot;vuln-software-config-46&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-46-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-46-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_gold_6348h_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_gold_6348h_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_gold_6348h_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-46-0-0-0&quot;,&quot;id&quot;:&quot;15560080&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-46-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_gold_6348h%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_gold_6348h:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_gold_6348h:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-46-0-1-0&quot;,&quot;id&quot;:&quot;15560081&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:47,&quot;dataTestId&quot;:&quot;vuln-software-config-47&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-47-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-47-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_platinum_8353h_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_platinum_8353h_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_platinum_8353h_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-47-0-0-0&quot;,&quot;id&quot;:&quot;15560082&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-47-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_platinum_8353h%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_platinum_8353h:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_platinum_8353h:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-47-0-1-0&quot;,&quot;id&quot;:&quot;15560083&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:48,&quot;dataTestId&quot;:&quot;vuln-software-config-48&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-48-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-48-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_platinum_8354h_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_platinum_8354h_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_platinum_8354h_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-48-0-0-0&quot;,&quot;id&quot;:&quot;15560084&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-48-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_platinum_8354h%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_platinum_8354h:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_platinum_8354h:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-48-0-1-0&quot;,&quot;id&quot;:&quot;15560085&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:49,&quot;dataTestId&quot;:&quot;vuln-software-config-49&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-49-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-49-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_platinum_8376h_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_platinum_8376h_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_platinum_8376h_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-49-0-0-0&quot;,&quot;id&quot;:&quot;15560086&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-49-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_platinum_8376h%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_platinum_8376h:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_platinum_8376h:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-49-0-1-0&quot;,&quot;id&quot;:&quot;15560087&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:50,&quot;dataTestId&quot;:&quot;vuln-software-config-50&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-50-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-50-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_platinum_8376hl_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_platinum_8376hl_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_platinum_8376hl_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-50-0-0-0&quot;,&quot;id&quot;:&quot;15560088&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-50-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_platinum_8376hl%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_platinum_8376hl:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_platinum_8376hl:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-50-0-1-0&quot;,&quot;id&quot;:&quot;15560089&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:51,&quot;dataTestId&quot;:&quot;vuln-software-config-51&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-51-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-51-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_platinum_8380h_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_platinum_8380h_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_platinum_8380h_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-51-0-0-0&quot;,&quot;id&quot;:&quot;15560090&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-51-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_platinum_8380h%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_platinum_8380h:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_platinum_8380h:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-51-0-1-0&quot;,&quot;id&quot;:&quot;15560091&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:52,&quot;dataTestId&quot;:&quot;vuln-software-config-52&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-52-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-52-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_platinum_8380hl_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_platinum_8380hl_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_platinum_8380hl_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-52-0-0-0&quot;,&quot;id&quot;:&quot;15560092&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-52-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_platinum_8380hl%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_platinum_8380hl:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_platinum_8380hl:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-52-0-1-0&quot;,&quot;id&quot;:&quot;15560093&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:53,&quot;dataTestId&quot;:&quot;vuln-software-config-53&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-53-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-53-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_e-2314_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_e-2314_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_e-2314_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-53-0-0-0&quot;,&quot;id&quot;:&quot;15560094&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-53-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_e-2314%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_e-2314:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_e-2314:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-53-0-1-0&quot;,&quot;id&quot;:&quot;15560095&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:54,&quot;dataTestId&quot;:&quot;vuln-software-config-54&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-54-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-54-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_e-2324g_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_e-2324g_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_e-2324g_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-54-0-0-0&quot;,&quot;id&quot;:&quot;15560096&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-54-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_e-2324g%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_e-2324g:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_e-2324g:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-54-0-1-0&quot;,&quot;id&quot;:&quot;15560097&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:55,&quot;dataTestId&quot;:&quot;vuln-software-config-55&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-55-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-55-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_e-2334_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_e-2334_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_e-2334_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-55-0-0-0&quot;,&quot;id&quot;:&quot;15560098&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-55-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_e-2334%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_e-2334:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_e-2334:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-55-0-1-0&quot;,&quot;id&quot;:&quot;15560099&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:56,&quot;dataTestId&quot;:&quot;vuln-software-config-56&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-56-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-56-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_e-2336_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_e-2336_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_e-2336_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-56-0-0-0&quot;,&quot;id&quot;:&quot;15560100&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-56-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_e-2336%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_e-2336:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_e-2336:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-56-0-1-0&quot;,&quot;id&quot;:&quot;15560101&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:57,&quot;dataTestId&quot;:&quot;vuln-software-config-57&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-57-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-57-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_e-2356g_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_e-2356g_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_e-2356g_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-57-0-0-0&quot;,&quot;id&quot;:&quot;15560102&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-57-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_e-2356g%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_e-2356g:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_e-2356g:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-57-0-1-0&quot;,&quot;id&quot;:&quot;15560103&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:58,&quot;dataTestId&quot;:&quot;vuln-software-config-58&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-58-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-58-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_e-2374g_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_e-2374g_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_e-2374g_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-58-0-0-0&quot;,&quot;id&quot;:&quot;15560104&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-58-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_e-2374g%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_e-2374g:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_e-2374g:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-58-0-1-0&quot;,&quot;id&quot;:&quot;15560105&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:59,&quot;dataTestId&quot;:&quot;vuln-software-config-59&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-59-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-59-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_e-2378_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_e-2378_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_e-2378_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-59-0-0-0&quot;,&quot;id&quot;:&quot;15560106&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-59-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_e-2378%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_e-2378:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_e-2378:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-59-0-1-0&quot;,&quot;id&quot;:&quot;15560107&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:60,&quot;dataTestId&quot;:&quot;vuln-software-config-60&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-60-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-60-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_e-2378g_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_e-2378g_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_e-2378g_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-60-0-0-0&quot;,&quot;id&quot;:&quot;15560108&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-60-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_e-2378g%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_e-2378g:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_e-2378g:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-60-0-1-0&quot;,&quot;id&quot;:&quot;15560109&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:61,&quot;dataTestId&quot;:&quot;vuln-software-config-61&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-61-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-61-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_e-2386g_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_e-2386g_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_e-2386g_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-61-0-0-0&quot;,&quot;id&quot;:&quot;15560110&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-61-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_e-2386g%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_e-2386g:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_e-2386g:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-61-0-1-0&quot;,&quot;id&quot;:&quot;15560111&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:62,&quot;dataTestId&quot;:&quot;vuln-software-config-62&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-62-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-62-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_e-2388g_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_e-2388g_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_e-2388g_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-62-0-0-0&quot;,&quot;id&quot;:&quot;15560112&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-62-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_e-2388g%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_e-2388g:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_e-2388g:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-62-0-1-0&quot;,&quot;id&quot;:&quot;15560113&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:63,&quot;dataTestId&quot;:&quot;vuln-software-config-63&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-63-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-63-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_e-2226ge_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_e-2226ge_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_e-2226ge_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-63-0-0-0&quot;,&quot;id&quot;:&quot;15560122&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-63-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_e-2226ge%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_e-2226ge:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_e-2226ge:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-63-0-1-0&quot;,&quot;id&quot;:&quot;15560123&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:64,&quot;dataTestId&quot;:&quot;vuln-software-config-64&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-64-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-64-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_e-2254me_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_e-2254me_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_e-2254me_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-64-0-0-0&quot;,&quot;id&quot;:&quot;15560124&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-64-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_e-2254me%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_e-2254me:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_e-2254me:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-64-0-1-0&quot;,&quot;id&quot;:&quot;15560125&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:65,&quot;dataTestId&quot;:&quot;vuln-software-config-65&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-65-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-65-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_e-2254ml_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_e-2254ml_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_e-2254ml_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-65-0-0-0&quot;,&quot;id&quot;:&quot;15560126&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-65-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_e-2254ml%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_e-2254ml:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_e-2254ml:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-65-0-1-0&quot;,&quot;id&quot;:&quot;15560127&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:66,&quot;dataTestId&quot;:&quot;vuln-software-config-66&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-66-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-66-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_e-2276me_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_e-2276me_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_e-2276me_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-66-0-0-0&quot;,&quot;id&quot;:&quot;15560128&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-66-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_e-2276me%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_e-2276me:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_e-2276me:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-66-0-1-0&quot;,&quot;id&quot;:&quot;15560129&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:67,&quot;dataTestId&quot;:&quot;vuln-software-config-67&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-67-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-67-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_e-2276ml_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_e-2276ml_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_e-2276ml_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-67-0-0-0&quot;,&quot;id&quot;:&quot;15560130&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-67-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_e-2276ml%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_e-2276ml:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_e-2276ml:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-67-0-1-0&quot;,&quot;id&quot;:&quot;15560131&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:68,&quot;dataTestId&quot;:&quot;vuln-software-config-68&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-68-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-68-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_e-2278ge_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_e-2278ge_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_e-2278ge_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-68-0-0-0&quot;,&quot;id&quot;:&quot;15560132&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-68-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_e-2278ge%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_e-2278ge:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_e-2278ge:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-68-0-1-0&quot;,&quot;id&quot;:&quot;15560133&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:69,&quot;dataTestId&quot;:&quot;vuln-software-config-69&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-69-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-69-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_e-2278gel_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_e-2278gel_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_e-2278gel_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-69-0-0-0&quot;,&quot;id&quot;:&quot;15560134&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-69-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_e-2278gel%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_e-2278gel:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_e-2278gel:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-69-0-1-0&quot;,&quot;id&quot;:&quot;15560135&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:70,&quot;dataTestId&quot;:&quot;vuln-software-config-70&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-70-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-70-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_e-2224_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_e-2224_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_e-2224_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-70-0-0-0&quot;,&quot;id&quot;:&quot;15560136&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-70-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_e-2224%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_e-2224:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_e-2224:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-70-0-1-0&quot;,&quot;id&quot;:&quot;15560137&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:71,&quot;dataTestId&quot;:&quot;vuln-software-config-71&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-71-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-71-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_e-2224g_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_e-2224g_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_e-2224g_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-71-0-0-0&quot;,&quot;id&quot;:&quot;15560138&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-71-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_e-2224g%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_e-2224g:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_e-2224g:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-71-0-1-0&quot;,&quot;id&quot;:&quot;15560139&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:72,&quot;dataTestId&quot;:&quot;vuln-software-config-72&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-72-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-72-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_e-2226g_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_e-2226g_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_e-2226g_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-72-0-0-0&quot;,&quot;id&quot;:&quot;15560140&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-72-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_e-2226g%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_e-2226g:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_e-2226g:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-72-0-1-0&quot;,&quot;id&quot;:&quot;15560141&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:73,&quot;dataTestId&quot;:&quot;vuln-software-config-73&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-73-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-73-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_e-2234_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_e-2234_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_e-2234_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-73-0-0-0&quot;,&quot;id&quot;:&quot;15560142&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-73-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_e-2234%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_e-2234:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_e-2234:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-73-0-1-0&quot;,&quot;id&quot;:&quot;15560143&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:74,&quot;dataTestId&quot;:&quot;vuln-software-config-74&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-74-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-74-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_e-2236_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_e-2236_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_e-2236_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-74-0-0-0&quot;,&quot;id&quot;:&quot;15560144&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-74-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_e-2236%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_e-2236:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_e-2236:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-74-0-1-0&quot;,&quot;id&quot;:&quot;15560145&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:75,&quot;dataTestId&quot;:&quot;vuln-software-config-75&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-75-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-75-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_e-2244g_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_e-2244g_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_e-2244g_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-75-0-0-0&quot;,&quot;id&quot;:&quot;15560146&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-75-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_e-2244g%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_e-2244g:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_e-2244g:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-75-0-1-0&quot;,&quot;id&quot;:&quot;15560147&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:76,&quot;dataTestId&quot;:&quot;vuln-software-config-76&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-76-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-76-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_e-2246g_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_e-2246g_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_e-2246g_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-76-0-0-0&quot;,&quot;id&quot;:&quot;15560114&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-76-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_e-2246g%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_e-2246g:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_e-2246g:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-76-0-1-0&quot;,&quot;id&quot;:&quot;15560115&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:77,&quot;dataTestId&quot;:&quot;vuln-software-config-77&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-77-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-77-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_e-2274g_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_e-2274g_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_e-2274g_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-77-0-0-0&quot;,&quot;id&quot;:&quot;15560116&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-77-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_e-2274g%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_e-2274g:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_e-2274g:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-77-0-1-0&quot;,&quot;id&quot;:&quot;15560117&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:78,&quot;dataTestId&quot;:&quot;vuln-software-config-78&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-78-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-78-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_e-2276g_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_e-2276g_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_e-2276g_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-78-0-0-0&quot;,&quot;id&quot;:&quot;15560118&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-78-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_e-2276g%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_e-2276g:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_e-2276g:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-78-0-1-0&quot;,&quot;id&quot;:&quot;15560119&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:79,&quot;dataTestId&quot;:&quot;vuln-software-config-79&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-79-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-79-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_e-2276m_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_e-2276m_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_e-2276m_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-79-0-0-0&quot;,&quot;id&quot;:&quot;15560120&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-79-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_e-2276m%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_e-2276m:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_e-2276m:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-79-0-1-0&quot;,&quot;id&quot;:&quot;15560121&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:80,&quot;dataTestId&quot;:&quot;vuln-software-config-80&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-80-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-80-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_e-2278g_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_e-2278g_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_e-2278g_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-80-0-0-0&quot;,&quot;id&quot;:&quot;15560196&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-80-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_e-2278g%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_e-2278g:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_e-2278g:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-80-0-1-0&quot;,&quot;id&quot;:&quot;15560197&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:81,&quot;dataTestId&quot;:&quot;vuln-software-config-81&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-81-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-81-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_e-2286g_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_e-2286g_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_e-2286g_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-81-0-0-0&quot;,&quot;id&quot;:&quot;15560198&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-81-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_e-2286g%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_e-2286g:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_e-2286g:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-81-0-1-0&quot;,&quot;id&quot;:&quot;15560199&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:82,&quot;dataTestId&quot;:&quot;vuln-software-config-82&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-82-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-82-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_e-2286m_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_e-2286m_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_e-2286m_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-82-0-0-0&quot;,&quot;id&quot;:&quot;15560200&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-82-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_e-2286m%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_e-2286m:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_e-2286m:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-82-0-1-0&quot;,&quot;id&quot;:&quot;15560201&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:83,&quot;dataTestId&quot;:&quot;vuln-software-config-83&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-83-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-83-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_e-2288g_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_e-2288g_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_e-2288g_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-83-0-0-0&quot;,&quot;id&quot;:&quot;15560202&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-83-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_e-2288g%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_e-2288g:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_e-2288g:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-83-0-1-0&quot;,&quot;id&quot;:&quot;15560203&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:84,&quot;dataTestId&quot;:&quot;vuln-software-config-84&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-84-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-84-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_e-2124_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_e-2124_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_e-2124_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-84-0-0-0&quot;,&quot;id&quot;:&quot;15560204&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-84-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_e-2124%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_e-2124:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_e-2124:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-84-0-1-0&quot;,&quot;id&quot;:&quot;15560205&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:85,&quot;dataTestId&quot;:&quot;vuln-software-config-85&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-85-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-85-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_e-2124g_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_e-2124g_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_e-2124g_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-85-0-0-0&quot;,&quot;id&quot;:&quot;15560206&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-85-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_e-2124g%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_e-2124g:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_e-2124g:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-85-0-1-0&quot;,&quot;id&quot;:&quot;15560207&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:86,&quot;dataTestId&quot;:&quot;vuln-software-config-86&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-86-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-86-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_e-2126g_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_e-2126g_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_e-2126g_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-86-0-0-0&quot;,&quot;id&quot;:&quot;15560208&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-86-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_e-2126g%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_e-2126g:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_e-2126g:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-86-0-1-0&quot;,&quot;id&quot;:&quot;15560209&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:87,&quot;dataTestId&quot;:&quot;vuln-software-config-87&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-87-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-87-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_e-2134_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_e-2134_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_e-2134_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-87-0-0-0&quot;,&quot;id&quot;:&quot;15560210&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-87-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_e-2134%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_e-2134:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_e-2134:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-87-0-1-0&quot;,&quot;id&quot;:&quot;15560211&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:88,&quot;dataTestId&quot;:&quot;vuln-software-config-88&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-88-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-88-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_e-2136_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_e-2136_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_e-2136_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-88-0-0-0&quot;,&quot;id&quot;:&quot;15560212&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-88-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_e-2136%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_e-2136:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_e-2136:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-88-0-1-0&quot;,&quot;id&quot;:&quot;15560213&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:89,&quot;dataTestId&quot;:&quot;vuln-software-config-89&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-89-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-89-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_e-2144g_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_e-2144g_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_e-2144g_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-89-0-0-0&quot;,&quot;id&quot;:&quot;15560214&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-89-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_e-2144g%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_e-2144g:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_e-2144g:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-89-0-1-0&quot;,&quot;id&quot;:&quot;15560215&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:90,&quot;dataTestId&quot;:&quot;vuln-software-config-90&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-90-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-90-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_e-2146g_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_e-2146g_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_e-2146g_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-90-0-0-0&quot;,&quot;id&quot;:&quot;15560216&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-90-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_e-2146g%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_e-2146g:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_e-2146g:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-90-0-1-0&quot;,&quot;id&quot;:&quot;15560217&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:91,&quot;dataTestId&quot;:&quot;vuln-software-config-91&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-91-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-91-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_e-2174g_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_e-2174g_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_e-2174g_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-91-0-0-0&quot;,&quot;id&quot;:&quot;15560218&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-91-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_e-2174g%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_e-2174g:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_e-2174g:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-91-0-1-0&quot;,&quot;id&quot;:&quot;15560219&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:92,&quot;dataTestId&quot;:&quot;vuln-software-config-92&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-92-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-92-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_e-2176g_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_e-2176g_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_e-2176g_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-92-0-0-0&quot;,&quot;id&quot;:&quot;15560220&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-92-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_e-2176g%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_e-2176g:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_e-2176g:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-92-0-1-0&quot;,&quot;id&quot;:&quot;15560221&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:93,&quot;dataTestId&quot;:&quot;vuln-software-config-93&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-93-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-93-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_e-2186g_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_e-2186g_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_e-2186g_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-93-0-0-0&quot;,&quot;id&quot;:&quot;15560222&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-93-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_e-2186g%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_e-2186g:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_e-2186g:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-93-0-1-0&quot;,&quot;id&quot;:&quot;15560223&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:94,&quot;dataTestId&quot;:&quot;vuln-software-config-94&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-94-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-94-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_e-2176m_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_e-2176m_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_e-2176m_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-94-0-0-0&quot;,&quot;id&quot;:&quot;15560224&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-94-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_e-2176m%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_e-2176m:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_e-2176m:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-94-0-1-0&quot;,&quot;id&quot;:&quot;15560225&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:95,&quot;dataTestId&quot;:&quot;vuln-software-config-95&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-95-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-95-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_e-2186m_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_e-2186m_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_e-2186m_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-95-0-0-0&quot;,&quot;id&quot;:&quot;15560226&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-95-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_e-2186m%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_e-2186m:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_e-2186m:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-95-0-1-0&quot;,&quot;id&quot;:&quot;15560227&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:96,&quot;dataTestId&quot;:&quot;vuln-software-config-96&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-96-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-96-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Acore_i7-11850he_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:core_i7-11850he_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:core_i7-11850he_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-96-0-0-0&quot;,&quot;id&quot;:&quot;15560228&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-96-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Acore_i7-11850he%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:core_i7-11850he:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:core_i7-11850he:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-96-0-1-0&quot;,&quot;id&quot;:&quot;15560229&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:97,&quot;dataTestId&quot;:&quot;vuln-software-config-97&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-97-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-97-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Acore_i7-11600h_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:core_i7-11600h_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:core_i7-11600h_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-97-0-0-0&quot;,&quot;id&quot;:&quot;15560230&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-97-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Acore_i7-11600h%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:core_i7-11600h:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:core_i7-11600h:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-97-0-1-0&quot;,&quot;id&quot;:&quot;15560231&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:98,&quot;dataTestId&quot;:&quot;vuln-software-config-98&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-98-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-98-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Acore_i7-11390h_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:core_i7-11390h_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:core_i7-11390h_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-98-0-0-0&quot;,&quot;id&quot;:&quot;15560232&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-98-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Acore_i7-11390h%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:core_i7-11390h:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:core_i7-11390h:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-98-0-1-0&quot;,&quot;id&quot;:&quot;15560233&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:99,&quot;dataTestId&quot;:&quot;vuln-software-config-99&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-99-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-99-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Acore_i7-1195g7_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:core_i7-1195g7_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:core_i7-1195g7_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-99-0-0-0&quot;,&quot;id&quot;:&quot;15560234&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-99-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Acore_i7-1195g7%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:core_i7-1195g7:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:core_i7-1195g7:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-99-0-1-0&quot;,&quot;id&quot;:&quot;15560235&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:100,&quot;dataTestId&quot;:&quot;vuln-software-config-100&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-100-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-100-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Acore_i7-1195g7_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:core_i7-1195g7_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:core_i7-1195g7_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-100-0-0-0&quot;,&quot;id&quot;:&quot;15560148&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-100-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Acore_i7-1195g7%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:core_i7-1195g7:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:core_i7-1195g7:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-100-0-1-0&quot;,&quot;id&quot;:&quot;15560149&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:101,&quot;dataTestId&quot;:&quot;vuln-software-config-101&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-101-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-101-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Acore_i7-11800h_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:core_i7-11800h_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:core_i7-11800h_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-101-0-0-0&quot;,&quot;id&quot;:&quot;15560150&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-101-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Acore_i7-11800h%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:core_i7-11800h:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:core_i7-11800h:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-101-0-1-0&quot;,&quot;id&quot;:&quot;15560151&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:102,&quot;dataTestId&quot;:&quot;vuln-software-config-102&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-102-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-102-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Acore_i7-11850h_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:core_i7-11850h_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:core_i7-11850h_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-102-0-0-0&quot;,&quot;id&quot;:&quot;15560152&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-102-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Acore_i7-11850h%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:core_i7-11850h:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:core_i7-11850h:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-102-0-1-0&quot;,&quot;id&quot;:&quot;15560153&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:103,&quot;dataTestId&quot;:&quot;vuln-software-config-103&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-103-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-103-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Acore_i7-11700_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:core_i7-11700_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:core_i7-11700_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-103-0-0-0&quot;,&quot;id&quot;:&quot;15560154&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-103-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Acore_i7-11700%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:core_i7-11700:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:core_i7-11700:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-103-0-1-0&quot;,&quot;id&quot;:&quot;15560155&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:104,&quot;dataTestId&quot;:&quot;vuln-software-config-104&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-104-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-104-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Acore_i7-11700f_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:core_i7-11700f_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:core_i7-11700f_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-104-0-0-0&quot;,&quot;id&quot;:&quot;15560156&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-104-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Acore_i7-11700f%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:core_i7-11700f:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:core_i7-11700f:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-104-0-1-0&quot;,&quot;id&quot;:&quot;15560157&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:105,&quot;dataTestId&quot;:&quot;vuln-software-config-105&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-105-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-105-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Acore_i7-11700k_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:core_i7-11700k_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:core_i7-11700k_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-105-0-0-0&quot;,&quot;id&quot;:&quot;15560158&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-105-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Acore_i7-11700k%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:core_i7-11700k:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:core_i7-11700k:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-105-0-1-0&quot;,&quot;id&quot;:&quot;15560159&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:106,&quot;dataTestId&quot;:&quot;vuln-software-config-106&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-106-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-106-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Acore_i7-11700kf_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:core_i7-11700kf_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:core_i7-11700kf_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-106-0-0-0&quot;,&quot;id&quot;:&quot;15560160&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-106-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Acore_i7-11700kf%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:core_i7-11700kf:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:core_i7-11700kf:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-106-0-1-0&quot;,&quot;id&quot;:&quot;15560161&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:107,&quot;dataTestId&quot;:&quot;vuln-software-config-107&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-107-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-107-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Acore_i7-11700t_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:core_i7-11700t_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:core_i7-11700t_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-107-0-0-0&quot;,&quot;id&quot;:&quot;15560162&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-107-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Acore_i7-11700t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:core_i7-11700t:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:core_i7-11700t:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-107-0-1-0&quot;,&quot;id&quot;:&quot;15560163&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:108,&quot;dataTestId&quot;:&quot;vuln-software-config-108&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-108-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-108-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Acore_i7-11370h_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:core_i7-11370h_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:core_i7-11370h_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-108-0-0-0&quot;,&quot;id&quot;:&quot;15560164&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-108-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Acore_i7-11370h%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:core_i7-11370h:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:core_i7-11370h:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-108-0-1-0&quot;,&quot;id&quot;:&quot;15560165&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:109,&quot;dataTestId&quot;:&quot;vuln-software-config-109&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-109-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-109-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Acore_i7-11375h_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:core_i7-11375h_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:core_i7-11375h_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-109-0-0-0&quot;,&quot;id&quot;:&quot;15560166&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-109-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Acore_i7-11375h%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:core_i7-11375h:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:core_i7-11375h:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-109-0-1-0&quot;,&quot;id&quot;:&quot;15560167&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:110,&quot;dataTestId&quot;:&quot;vuln-software-config-110&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-110-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-110-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Acore_i7-1180g7_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:core_i7-1180g7_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:core_i7-1180g7_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-110-0-0-0&quot;,&quot;id&quot;:&quot;15560168&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-110-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Acore_i7-1180g7%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:core_i7-1180g7:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:core_i7-1180g7:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-110-0-1-0&quot;,&quot;id&quot;:&quot;15560169&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:111,&quot;dataTestId&quot;:&quot;vuln-software-config-111&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-111-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-111-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Acore_i7-1185g7e_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:core_i7-1185g7e_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:core_i7-1185g7e_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-111-0-0-0&quot;,&quot;id&quot;:&quot;15560170&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-111-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Acore_i7-1185g7e%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:core_i7-1185g7e:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:core_i7-1185g7e:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-111-0-1-0&quot;,&quot;id&quot;:&quot;15560171&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:112,&quot;dataTestId&quot;:&quot;vuln-software-config-112&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-112-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-112-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Acore_i7-1185gre_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:core_i7-1185gre_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:core_i7-1185gre_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-112-0-0-0&quot;,&quot;id&quot;:&quot;15560172&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-112-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Acore_i7-1185gre%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:core_i7-1185gre:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:core_i7-1185gre:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-112-0-1-0&quot;,&quot;id&quot;:&quot;15560173&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:113,&quot;dataTestId&quot;:&quot;vuln-software-config-113&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-113-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-113-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Acore_i7-1160g7_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:core_i7-1160g7_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:core_i7-1160g7_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-113-0-0-0&quot;,&quot;id&quot;:&quot;15560174&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-113-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Acore_i7-1160g7%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:core_i7-1160g7:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:core_i7-1160g7:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-113-0-1-0&quot;,&quot;id&quot;:&quot;15560175&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:114,&quot;dataTestId&quot;:&quot;vuln-software-config-114&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-114-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-114-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Acore_i7-1165g7_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:core_i7-1165g7_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:core_i7-1165g7_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-114-0-0-0&quot;,&quot;id&quot;:&quot;15560176&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-114-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Acore_i7-1165g7%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:core_i7-1165g7:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:core_i7-1165g7:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-114-0-1-0&quot;,&quot;id&quot;:&quot;15560177&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:115,&quot;dataTestId&quot;:&quot;vuln-software-config-115&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-115-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-115-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Acore_i7-1165g7_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:core_i7-1165g7_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:core_i7-1165g7_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-115-0-0-0&quot;,&quot;id&quot;:&quot;15560178&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-115-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Acore_i7-1165g7%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:core_i7-1165g7:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:core_i7-1165g7:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-115-0-1-0&quot;,&quot;id&quot;:&quot;15560179&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:116,&quot;dataTestId&quot;:&quot;vuln-software-config-116&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-116-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-116-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Acore_i7-1185g7_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:core_i7-1185g7_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:core_i7-1185g7_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-116-0-0-0&quot;,&quot;id&quot;:&quot;15560180&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-116-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Acore_i7-1185g7%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:core_i7-1185g7:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:core_i7-1185g7:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-116-0-1-0&quot;,&quot;id&quot;:&quot;15560181&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:117,&quot;dataTestId&quot;:&quot;vuln-software-config-117&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-117-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-117-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Acore_i9-11900h_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:core_i9-11900h_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:core_i9-11900h_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-117-0-0-0&quot;,&quot;id&quot;:&quot;15560182&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-117-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Acore_i9-11900h%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:core_i9-11900h:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:core_i9-11900h:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-117-0-1-0&quot;,&quot;id&quot;:&quot;15560183&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:118,&quot;dataTestId&quot;:&quot;vuln-software-config-118&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-118-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-118-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Acore_i9-11950h_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:core_i9-11950h_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:core_i9-11950h_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-118-0-0-0&quot;,&quot;id&quot;:&quot;15560184&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-118-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Acore_i9-11950h%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:core_i9-11950h:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:core_i9-11950h:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-118-0-1-0&quot;,&quot;id&quot;:&quot;15560185&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:119,&quot;dataTestId&quot;:&quot;vuln-software-config-119&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-119-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-119-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Acore_i9-11980hk_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:core_i9-11980hk_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:core_i9-11980hk_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-119-0-0-0&quot;,&quot;id&quot;:&quot;15560186&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-119-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Acore_i9-11980hk%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:core_i9-11980hk:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:core_i9-11980hk:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-119-0-1-0&quot;,&quot;id&quot;:&quot;15560187&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:120,&quot;dataTestId&quot;:&quot;vuln-software-config-120&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-120-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-120-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Acore_i9-11900_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:core_i9-11900_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:core_i9-11900_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-120-0-0-0&quot;,&quot;id&quot;:&quot;15560188&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-120-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Acore_i9-11900%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:core_i9-11900:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:core_i9-11900:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-120-0-1-0&quot;,&quot;id&quot;:&quot;15560189&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:121,&quot;dataTestId&quot;:&quot;vuln-software-config-121&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-121-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-121-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Acore_i9-11900f_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:core_i9-11900f_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:core_i9-11900f_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-121-0-0-0&quot;,&quot;id&quot;:&quot;15560190&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-121-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Acore_i9-11900f%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:core_i9-11900f:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:core_i9-11900f:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-121-0-1-0&quot;,&quot;id&quot;:&quot;15560191&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:122,&quot;dataTestId&quot;:&quot;vuln-software-config-122&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-122-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-122-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Acore_i9-11900k_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:core_i9-11900k_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:core_i9-11900k_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-122-0-0-0&quot;,&quot;id&quot;:&quot;15560192&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-122-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Acore_i9-11900k%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:core_i9-11900k:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:core_i9-11900k:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-122-0-1-0&quot;,&quot;id&quot;:&quot;15560193&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:123,&quot;dataTestId&quot;:&quot;vuln-software-config-123&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-123-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-123-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Acore_i9-11900kf_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:core_i9-11900kf_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:core_i9-11900kf_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-123-0-0-0&quot;,&quot;id&quot;:&quot;15560194&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-123-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Acore_i9-11900kf%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:core_i9-11900kf:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:core_i9-11900kf:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-123-0-1-0&quot;,&quot;id&quot;:&quot;15560195&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:124,&quot;dataTestId&quot;:&quot;vuln-software-config-124&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-124-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-124-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Acore_i9-11900t_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:core_i9-11900t_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:core_i9-11900t_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-124-0-0-0&quot;,&quot;id&quot;:&quot;15560236&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-124-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Acore_i9-11900t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:core_i9-11900t:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:core_i9-11900t:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-124-0-1-0&quot;,&quot;id&quot;:&quot;15560237&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:125,&quot;dataTestId&quot;:&quot;vuln-software-config-125&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-125-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-125-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Acore_i5-11500he_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:core_i5-11500he_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:core_i5-11500he_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-125-0-0-0&quot;,&quot;id&quot;:&quot;15560238&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-125-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Acore_i5-11500he%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:core_i5-11500he:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:core_i5-11500he:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-125-0-1-0&quot;,&quot;id&quot;:&quot;15560239&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:126,&quot;dataTestId&quot;:&quot;vuln-software-config-126&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-126-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-126-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Acore_i5-11320h_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:core_i5-11320h_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:core_i5-11320h_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-126-0-0-0&quot;,&quot;id&quot;:&quot;15560240&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-126-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Acore_i5-11320h%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:core_i5-11320h:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:core_i5-11320h:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-126-0-1-0&quot;,&quot;id&quot;:&quot;15560241&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:127,&quot;dataTestId&quot;:&quot;vuln-software-config-127&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-127-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-127-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Acore_i5-1155g7_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:core_i5-1155g7_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:core_i5-1155g7_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-127-0-0-0&quot;,&quot;id&quot;:&quot;15560242&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-127-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Acore_i5-1155g7%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:core_i5-1155g7:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:core_i5-1155g7:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-127-0-1-0&quot;,&quot;id&quot;:&quot;15560243&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:128,&quot;dataTestId&quot;:&quot;vuln-software-config-128&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-128-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-128-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Acore_i5-1155g7_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:core_i5-1155g7_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:core_i5-1155g7_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-128-0-0-0&quot;,&quot;id&quot;:&quot;15560244&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-128-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Acore_i5-1155g7%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:core_i5-1155g7:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:core_i5-1155g7:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-128-0-1-0&quot;,&quot;id&quot;:&quot;15560245&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:129,&quot;dataTestId&quot;:&quot;vuln-software-config-129&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-129-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-129-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Acore_i5-11260h_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:core_i5-11260h_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:core_i5-11260h_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-129-0-0-0&quot;,&quot;id&quot;:&quot;15560246&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-129-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Acore_i5-11260h%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:core_i5-11260h:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:core_i5-11260h:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-129-0-1-0&quot;,&quot;id&quot;:&quot;15560247&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:130,&quot;dataTestId&quot;:&quot;vuln-software-config-130&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-130-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-130-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Acore_i5-11400h_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:core_i5-11400h_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:core_i5-11400h_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-130-0-0-0&quot;,&quot;id&quot;:&quot;15560248&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-130-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Acore_i5-11400h%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:core_i5-11400h:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:core_i5-11400h:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-130-0-1-0&quot;,&quot;id&quot;:&quot;15560249&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:131,&quot;dataTestId&quot;:&quot;vuln-software-config-131&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-131-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-131-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Acore_i5-11500h_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:core_i5-11500h_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:core_i5-11500h_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-131-0-0-0&quot;,&quot;id&quot;:&quot;15560250&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-131-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Acore_i5-11500h%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:core_i5-11500h:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:core_i5-11500h:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-131-0-1-0&quot;,&quot;id&quot;:&quot;15560251&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:132,&quot;dataTestId&quot;:&quot;vuln-software-config-132&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-132-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-132-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Acore_i5-11400_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:core_i5-11400_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:core_i5-11400_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-132-0-0-0&quot;,&quot;id&quot;:&quot;15560252&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-132-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Acore_i5-11400%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:core_i5-11400:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:core_i5-11400:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-132-0-1-0&quot;,&quot;id&quot;:&quot;15560253&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:133,&quot;dataTestId&quot;:&quot;vuln-software-config-133&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-133-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-133-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Acore_i5-11400f_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:core_i5-11400f_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:core_i5-11400f_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-133-0-0-0&quot;,&quot;id&quot;:&quot;15560254&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-133-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Acore_i5-11400f%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:core_i5-11400f:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:core_i5-11400f:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-133-0-1-0&quot;,&quot;id&quot;:&quot;15560255&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:134,&quot;dataTestId&quot;:&quot;vuln-software-config-134&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-134-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-134-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Acore_i5-11400t_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:core_i5-11400t_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:core_i5-11400t_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-134-0-0-0&quot;,&quot;id&quot;:&quot;15560256&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-134-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Acore_i5-11400t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:core_i5-11400t:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:core_i5-11400t:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-134-0-1-0&quot;,&quot;id&quot;:&quot;15560257&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:135,&quot;dataTestId&quot;:&quot;vuln-software-config-135&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-135-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-135-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Acore_i5-11500_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:core_i5-11500_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:core_i5-11500_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-135-0-0-0&quot;,&quot;id&quot;:&quot;15560258&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-135-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Acore_i5-11500%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:core_i5-11500:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:core_i5-11500:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-135-0-1-0&quot;,&quot;id&quot;:&quot;15560259&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:136,&quot;dataTestId&quot;:&quot;vuln-software-config-136&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-136-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-136-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Acore_i5-11500t_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:core_i5-11500t_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:core_i5-11500t_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-136-0-0-0&quot;,&quot;id&quot;:&quot;15560260&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-136-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Acore_i5-11500t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:core_i5-11500t:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:core_i5-11500t:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-136-0-1-0&quot;,&quot;id&quot;:&quot;15560261&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:137,&quot;dataTestId&quot;:&quot;vuln-software-config-137&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-137-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-137-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Acore_i5-11600_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:core_i5-11600_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:core_i5-11600_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-137-0-0-0&quot;,&quot;id&quot;:&quot;15560262&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-137-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Acore_i5-11600%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:core_i5-11600:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:core_i5-11600:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-137-0-1-0&quot;,&quot;id&quot;:&quot;15560263&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:138,&quot;dataTestId&quot;:&quot;vuln-software-config-138&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-138-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-138-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Acore_i5-11600k_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:core_i5-11600k_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:core_i5-11600k_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-138-0-0-0&quot;,&quot;id&quot;:&quot;15560264&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-138-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Acore_i5-11600k%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:core_i5-11600k:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:core_i5-11600k:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-138-0-1-0&quot;,&quot;id&quot;:&quot;15560265&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:139,&quot;dataTestId&quot;:&quot;vuln-software-config-139&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-139-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-139-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Acore_i5-11600kf_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:core_i5-11600kf_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:core_i5-11600kf_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-139-0-0-0&quot;,&quot;id&quot;:&quot;15560266&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-139-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Acore_i5-11600kf%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:core_i5-11600kf:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:core_i5-11600kf:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-139-0-1-0&quot;,&quot;id&quot;:&quot;15560267&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:140,&quot;dataTestId&quot;:&quot;vuln-software-config-140&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-140-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-140-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Acore_i5-11600t_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:core_i5-11600t_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:core_i5-11600t_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-140-0-0-0&quot;,&quot;id&quot;:&quot;15560268&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-140-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Acore_i5-11600t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:core_i5-11600t:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:core_i5-11600t:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-140-0-1-0&quot;,&quot;id&quot;:&quot;15560269&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:141,&quot;dataTestId&quot;:&quot;vuln-software-config-141&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-141-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-141-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Acore_i5-11300h_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:core_i5-11300h_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:core_i5-11300h_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-141-0-0-0&quot;,&quot;id&quot;:&quot;15560270&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-141-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Acore_i5-11300h%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:core_i5-11300h:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:core_i5-11300h:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-141-0-1-0&quot;,&quot;id&quot;:&quot;15560271&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:142,&quot;dataTestId&quot;:&quot;vuln-software-config-142&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-142-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-142-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Acore_i5-1140g7_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:core_i5-1140g7_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:core_i5-1140g7_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-142-0-0-0&quot;,&quot;id&quot;:&quot;15560272&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-142-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Acore_i5-1140g7%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:core_i5-1140g7:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:core_i5-1140g7:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-142-0-1-0&quot;,&quot;id&quot;:&quot;15560273&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:143,&quot;dataTestId&quot;:&quot;vuln-software-config-143&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-143-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-143-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Acore_i5-1145g7_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:core_i5-1145g7_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:core_i5-1145g7_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-143-0-0-0&quot;,&quot;id&quot;:&quot;15560274&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-143-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Acore_i5-1145g7%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:core_i5-1145g7:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:core_i5-1145g7:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-143-0-1-0&quot;,&quot;id&quot;:&quot;15560275&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:144,&quot;dataTestId&quot;:&quot;vuln-software-config-144&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-144-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-144-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Acore_i5-1145g7e_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:core_i5-1145g7e_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:core_i5-1145g7e_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-144-0-0-0&quot;,&quot;id&quot;:&quot;15560276&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-144-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Acore_i5-1145g7e%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:core_i5-1145g7e:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:core_i5-1145g7e:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-144-0-1-0&quot;,&quot;id&quot;:&quot;15560277&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:145,&quot;dataTestId&quot;:&quot;vuln-software-config-145&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-145-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-145-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Acore_i5-1145gre_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:core_i5-1145gre_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:core_i5-1145gre_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-145-0-0-0&quot;,&quot;id&quot;:&quot;15560278&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-145-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Acore_i5-1145gre%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:core_i5-1145gre:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:core_i5-1145gre:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-145-0-1-0&quot;,&quot;id&quot;:&quot;15560353&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:146,&quot;dataTestId&quot;:&quot;vuln-software-config-146&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-146-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-146-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Acore_i5-1130g7_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:core_i5-1130g7_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:core_i5-1130g7_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-146-0-0-0&quot;,&quot;id&quot;:&quot;15560354&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-146-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Acore_i5-1130g7%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:core_i5-1130g7:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:core_i5-1130g7:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-146-0-1-0&quot;,&quot;id&quot;:&quot;15560355&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:147,&quot;dataTestId&quot;:&quot;vuln-software-config-147&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-147-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-147-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Acore_i5-1135g7_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:core_i5-1135g7_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:core_i5-1135g7_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-147-0-0-0&quot;,&quot;id&quot;:&quot;15560356&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-147-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Acore_i5-1135g7%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:core_i5-1135g7:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:core_i5-1135g7:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-147-0-1-0&quot;,&quot;id&quot;:&quot;15560357&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:148,&quot;dataTestId&quot;:&quot;vuln-software-config-148&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-148-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-148-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Acore_i5-1135g7_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:core_i5-1135g7_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:core_i5-1135g7_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-148-0-0-0&quot;,&quot;id&quot;:&quot;15560339&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-148-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Acore_i5-1135g7%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:core_i5-1135g7:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:core_i5-1135g7:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-148-0-1-0&quot;,&quot;id&quot;:&quot;15560340&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:149,&quot;dataTestId&quot;:&quot;vuln-software-config-149&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-149-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-149-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Acore_i3-11100he_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:core_i3-11100he_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:core_i3-11100he_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-149-0-0-0&quot;,&quot;id&quot;:&quot;15560341&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-149-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Acore_i3-11100he%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:core_i3-11100he:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:core_i3-11100he:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-149-0-1-0&quot;,&quot;id&quot;:&quot;15560342&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:150,&quot;dataTestId&quot;:&quot;vuln-software-config-150&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-150-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-150-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Acore_i3-1115g4e_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:core_i3-1115g4e_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:core_i3-1115g4e_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-150-0-0-0&quot;,&quot;id&quot;:&quot;15560343&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-150-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Acore_i3-1115g4e%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:core_i3-1115g4e:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:core_i3-1115g4e:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-150-0-1-0&quot;,&quot;id&quot;:&quot;15560344&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:151,&quot;dataTestId&quot;:&quot;vuln-software-config-151&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-151-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-151-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Acore_i3-1115gre_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:core_i3-1115gre_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:core_i3-1115gre_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-151-0-0-0&quot;,&quot;id&quot;:&quot;15560345&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-151-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Acore_i3-1115gre%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:core_i3-1115gre:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:core_i3-1115gre:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-151-0-1-0&quot;,&quot;id&quot;:&quot;15560346&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:152,&quot;dataTestId&quot;:&quot;vuln-software-config-152&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-152-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-152-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Acore_i3-1120g4_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:core_i3-1120g4_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:core_i3-1120g4_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-152-0-0-0&quot;,&quot;id&quot;:&quot;15560347&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-152-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Acore_i3-1120g4%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:core_i3-1120g4:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:core_i3-1120g4:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-152-0-1-0&quot;,&quot;id&quot;:&quot;15560348&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:153,&quot;dataTestId&quot;:&quot;vuln-software-config-153&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-153-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-153-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Acore_i3-1125g4_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:core_i3-1125g4_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:core_i3-1125g4_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-153-0-0-0&quot;,&quot;id&quot;:&quot;15560349&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-153-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Acore_i3-1125g4%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:core_i3-1125g4:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:core_i3-1125g4:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-153-0-1-0&quot;,&quot;id&quot;:&quot;15560350&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:154,&quot;dataTestId&quot;:&quot;vuln-software-config-154&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-154-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-154-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Acore_i3-1125g4_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:core_i3-1125g4_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:core_i3-1125g4_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-154-0-0-0&quot;,&quot;id&quot;:&quot;15560351&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-154-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Acore_i3-1125g4%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:core_i3-1125g4:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:core_i3-1125g4:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-154-0-1-0&quot;,&quot;id&quot;:&quot;15560352&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:155,&quot;dataTestId&quot;:&quot;vuln-software-config-155&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-155-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-155-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Acore_i3-1110g4_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:core_i3-1110g4_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:core_i3-1110g4_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-155-0-0-0&quot;,&quot;id&quot;:&quot;15560279&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-155-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Acore_i3-1110g4%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:core_i3-1110g4:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:core_i3-1110g4:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-155-0-1-0&quot;,&quot;id&quot;:&quot;15560280&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:156,&quot;dataTestId&quot;:&quot;vuln-software-config-156&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-156-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-156-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Acore_i3-1115g4_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:core_i3-1115g4_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:core_i3-1115g4_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-156-0-0-0&quot;,&quot;id&quot;:&quot;15560281&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-156-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Acore_i3-1115g4%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:core_i3-1115g4:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:core_i3-1115g4:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-156-0-1-0&quot;,&quot;id&quot;:&quot;15560282&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:157,&quot;dataTestId&quot;:&quot;vuln-software-config-157&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-157-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-157-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Acore_i3-1115g4_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:core_i3-1115g4_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:core_i3-1115g4_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-157-0-0-0&quot;,&quot;id&quot;:&quot;15560283&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-157-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Acore_i3-1115g4%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:core_i3-1115g4:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:core_i3-1115g4:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-157-0-1-0&quot;,&quot;id&quot;:&quot;15560284&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:158,&quot;dataTestId&quot;:&quot;vuln-software-config-158&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-158-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-158-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_w3-2423_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_w3-2423_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_w3-2423_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-158-0-0-0&quot;,&quot;id&quot;:&quot;15560285&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-158-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_w3-2423%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_w3-2423:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_w3-2423:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-158-0-1-0&quot;,&quot;id&quot;:&quot;15560286&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:159,&quot;dataTestId&quot;:&quot;vuln-software-config-159&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-159-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-159-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_w3-2425_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_w3-2425_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_w3-2425_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-159-0-0-0&quot;,&quot;id&quot;:&quot;15560287&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-159-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_w3-2425%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_w3-2425:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_w3-2425:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-159-0-1-0&quot;,&quot;id&quot;:&quot;15560288&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:160,&quot;dataTestId&quot;:&quot;vuln-software-config-160&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-160-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-160-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_w3-2435_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_w3-2435_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_w3-2435_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-160-0-0-0&quot;,&quot;id&quot;:&quot;15560289&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-160-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_w3-2435%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_w3-2435:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_w3-2435:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-160-0-1-0&quot;,&quot;id&quot;:&quot;15560290&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:161,&quot;dataTestId&quot;:&quot;vuln-software-config-161&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-161-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-161-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_w5-2445_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_w5-2445_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_w5-2445_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-161-0-0-0&quot;,&quot;id&quot;:&quot;15560291&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-161-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_w5-2445%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_w5-2445:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_w5-2445:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-161-0-1-0&quot;,&quot;id&quot;:&quot;15560292&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:162,&quot;dataTestId&quot;:&quot;vuln-software-config-162&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-162-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-162-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_w5-2455x_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_w5-2455x_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_w5-2455x_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-162-0-0-0&quot;,&quot;id&quot;:&quot;15560293&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-162-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_w5-2455x%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_w5-2455x:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_w5-2455x:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-162-0-1-0&quot;,&quot;id&quot;:&quot;15560294&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:163,&quot;dataTestId&quot;:&quot;vuln-software-config-163&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-163-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-163-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_w5-2465x_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_w5-2465x_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_w5-2465x_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-163-0-0-0&quot;,&quot;id&quot;:&quot;15560295&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-163-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_w5-2465x%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_w5-2465x:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_w5-2465x:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-163-0-1-0&quot;,&quot;id&quot;:&quot;15560296&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:164,&quot;dataTestId&quot;:&quot;vuln-software-config-164&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-164-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-164-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_w5-3425_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_w5-3425_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_w5-3425_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-164-0-0-0&quot;,&quot;id&quot;:&quot;15560297&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-164-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_w5-3425%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_w5-3425:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_w5-3425:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-164-0-1-0&quot;,&quot;id&quot;:&quot;15560298&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:165,&quot;dataTestId&quot;:&quot;vuln-software-config-165&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-165-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-165-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_w5-3435x_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_w5-3435x_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_w5-3435x_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-165-0-0-0&quot;,&quot;id&quot;:&quot;15560299&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-165-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_w5-3435x%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_w5-3435x:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_w5-3435x:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-165-0-1-0&quot;,&quot;id&quot;:&quot;15560300&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:166,&quot;dataTestId&quot;:&quot;vuln-software-config-166&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-166-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-166-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_w7-2475x_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_w7-2475x_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_w7-2475x_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-166-0-0-0&quot;,&quot;id&quot;:&quot;15560301&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-166-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_w7-2475x%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_w7-2475x:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_w7-2475x:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-166-0-1-0&quot;,&quot;id&quot;:&quot;15560302&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:167,&quot;dataTestId&quot;:&quot;vuln-software-config-167&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-167-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-167-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_w7-2495x_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_w7-2495x_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_w7-2495x_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-167-0-0-0&quot;,&quot;id&quot;:&quot;15560303&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-167-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_w7-2495x%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_w7-2495x:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_w7-2495x:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-167-0-1-0&quot;,&quot;id&quot;:&quot;15560304&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:168,&quot;dataTestId&quot;:&quot;vuln-software-config-168&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-168-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-168-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_w7-3445_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_w7-3445_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_w7-3445_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-168-0-0-0&quot;,&quot;id&quot;:&quot;15560305&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-168-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_w7-3445%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_w7-3445:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_w7-3445:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-168-0-1-0&quot;,&quot;id&quot;:&quot;15560306&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:169,&quot;dataTestId&quot;:&quot;vuln-software-config-169&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-169-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-169-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_w7-3455_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_w7-3455_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_w7-3455_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-169-0-0-0&quot;,&quot;id&quot;:&quot;15560307&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-169-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_w7-3455%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_w7-3455:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_w7-3455:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-169-0-1-0&quot;,&quot;id&quot;:&quot;15560308&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:170,&quot;dataTestId&quot;:&quot;vuln-software-config-170&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-170-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-170-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_w7-3465x_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_w7-3465x_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_w7-3465x_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-170-0-0-0&quot;,&quot;id&quot;:&quot;15560309&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-170-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_w7-3465x%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_w7-3465x:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_w7-3465x:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-170-0-1-0&quot;,&quot;id&quot;:&quot;15560310&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:171,&quot;dataTestId&quot;:&quot;vuln-software-config-171&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-171-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-171-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_w9-3475x_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_w9-3475x_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_w9-3475x_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-171-0-0-0&quot;,&quot;id&quot;:&quot;15560311&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-171-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_w9-3475x%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_w9-3475x:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_w9-3475x:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-171-0-1-0&quot;,&quot;id&quot;:&quot;15560312&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:172,&quot;dataTestId&quot;:&quot;vuln-software-config-172&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-172-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-172-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_w9-3495x_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_w9-3495x_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_w9-3495x_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-172-0-0-0&quot;,&quot;id&quot;:&quot;15560313&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-172-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_w9-3495x%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_w9-3495x:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_w9-3495x:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-172-0-1-0&quot;,&quot;id&quot;:&quot;15560314&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:173,&quot;dataTestId&quot;:&quot;vuln-software-config-173&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-173-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-173-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_w-11155mle_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_w-11155mle_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_w-11155mle_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-173-0-0-0&quot;,&quot;id&quot;:&quot;15560315&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-173-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_w-11155mle%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_w-11155mle:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_w-11155mle:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-173-0-1-0&quot;,&quot;id&quot;:&quot;15560316&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:174,&quot;dataTestId&quot;:&quot;vuln-software-config-174&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-174-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-174-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_w-11155mre_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_w-11155mre_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_w-11155mre_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-174-0-0-0&quot;,&quot;id&quot;:&quot;15560317&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-174-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_w-11155mre%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_w-11155mre:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_w-11155mre:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-174-0-1-0&quot;,&quot;id&quot;:&quot;15560318&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:175,&quot;dataTestId&quot;:&quot;vuln-software-config-175&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-175-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-175-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_w-11555mle_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_w-11555mle_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_w-11555mle_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-175-0-0-0&quot;,&quot;id&quot;:&quot;15560319&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-175-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_w-11555mle%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_w-11555mle:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_w-11555mle:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-175-0-1-0&quot;,&quot;id&quot;:&quot;15560320&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:176,&quot;dataTestId&quot;:&quot;vuln-software-config-176&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-176-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-176-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_w-11555mre_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_w-11555mre_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_w-11555mre_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-176-0-0-0&quot;,&quot;id&quot;:&quot;15560321&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-176-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_w-11555mre%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_w-11555mre:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_w-11555mre:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-176-0-1-0&quot;,&quot;id&quot;:&quot;15560322&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:177,&quot;dataTestId&quot;:&quot;vuln-software-config-177&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-177-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-177-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_w-11865mle_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_w-11865mle_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_w-11865mle_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-177-0-0-0&quot;,&quot;id&quot;:&quot;15560323&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-177-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_w-11865mle%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_w-11865mle:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_w-11865mle:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-177-0-1-0&quot;,&quot;id&quot;:&quot;15560324&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:178,&quot;dataTestId&quot;:&quot;vuln-software-config-178&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-178-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-178-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_w-11865mre_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_w-11865mre_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_w-11865mre_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-178-0-0-0&quot;,&quot;id&quot;:&quot;15560325&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-178-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_w-11865mre%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_w-11865mre:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_w-11865mre:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-178-0-1-0&quot;,&quot;id&quot;:&quot;15560326&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:179,&quot;dataTestId&quot;:&quot;vuln-software-config-179&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-179-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-179-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_w-3323_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_w-3323_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_w-3323_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-179-0-0-0&quot;,&quot;id&quot;:&quot;15560327&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-179-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_w-3323%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_w-3323:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_w-3323:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-179-0-1-0&quot;,&quot;id&quot;:&quot;15560328&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:180,&quot;dataTestId&quot;:&quot;vuln-software-config-180&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-180-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-180-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_w-3335_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_w-3335_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_w-3335_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-180-0-0-0&quot;,&quot;id&quot;:&quot;15560329&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-180-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_w-3335%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_w-3335:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_w-3335:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-180-0-1-0&quot;,&quot;id&quot;:&quot;15560330&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:181,&quot;dataTestId&quot;:&quot;vuln-software-config-181&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-181-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-181-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_w-3345_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_w-3345_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_w-3345_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-181-0-0-0&quot;,&quot;id&quot;:&quot;15560331&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-181-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_w-3345%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_w-3345:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_w-3345:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-181-0-1-0&quot;,&quot;id&quot;:&quot;15560332&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:182,&quot;dataTestId&quot;:&quot;vuln-software-config-182&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-182-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-182-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_w-3365_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_w-3365_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_w-3365_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-182-0-0-0&quot;,&quot;id&quot;:&quot;15560333&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-182-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_w-3365%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_w-3365:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_w-3365:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-182-0-1-0&quot;,&quot;id&quot;:&quot;15560334&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:183,&quot;dataTestId&quot;:&quot;vuln-software-config-183&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-183-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-183-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_w-3375_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_w-3375_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_w-3375_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-183-0-0-0&quot;,&quot;id&quot;:&quot;15560335&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-183-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_w-3375%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_w-3375:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_w-3375:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-183-0-1-0&quot;,&quot;id&quot;:&quot;15560336&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:184,&quot;dataTestId&quot;:&quot;vuln-software-config-184&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-184-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-184-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_w-11855m_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_w-11855m_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_w-11855m_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-184-0-0-0&quot;,&quot;id&quot;:&quot;15560337&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-184-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_w-11855m%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_w-11855m:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_w-11855m:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-184-0-1-0&quot;,&quot;id&quot;:&quot;15560338&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:185,&quot;dataTestId&quot;:&quot;vuln-software-config-185&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-185-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-185-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_w-11955m_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_w-11955m_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_w-11955m_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-185-0-0-0&quot;,&quot;id&quot;:&quot;15560410&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-185-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_w-11955m%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_w-11955m:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_w-11955m:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-185-0-1-0&quot;,&quot;id&quot;:&quot;15560411&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:186,&quot;dataTestId&quot;:&quot;vuln-software-config-186&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-186-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-186-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_w-1350_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_w-1350_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_w-1350_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-186-0-0-0&quot;,&quot;id&quot;:&quot;15560412&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-186-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_w-1350%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_w-1350:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_w-1350:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-186-0-1-0&quot;,&quot;id&quot;:&quot;15560413&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:187,&quot;dataTestId&quot;:&quot;vuln-software-config-187&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-187-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-187-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_w-1350p_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_w-1350p_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_w-1350p_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-187-0-0-0&quot;,&quot;id&quot;:&quot;15560414&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-187-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_w-1350p%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_w-1350p:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_w-1350p:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-187-0-1-0&quot;,&quot;id&quot;:&quot;15560415&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:188,&quot;dataTestId&quot;:&quot;vuln-software-config-188&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-188-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-188-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_w-1370_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_w-1370_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_w-1370_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-188-0-0-0&quot;,&quot;id&quot;:&quot;15560416&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-188-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_w-1370%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_w-1370:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_w-1370:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-188-0-1-0&quot;,&quot;id&quot;:&quot;15560417&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:189,&quot;dataTestId&quot;:&quot;vuln-software-config-189&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-189-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-189-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_w-1370p_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_w-1370p_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_w-1370p_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-189-0-0-0&quot;,&quot;id&quot;:&quot;15560418&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-189-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_w-1370p%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_w-1370p:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_w-1370p:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-189-0-1-0&quot;,&quot;id&quot;:&quot;15560419&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:190,&quot;dataTestId&quot;:&quot;vuln-software-config-190&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-190-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-190-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_w-1390_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_w-1390_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_w-1390_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-190-0-0-0&quot;,&quot;id&quot;:&quot;15560420&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-190-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_w-1390%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_w-1390:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_w-1390:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-190-0-1-0&quot;,&quot;id&quot;:&quot;15560421&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:191,&quot;dataTestId&quot;:&quot;vuln-software-config-191&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-191-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-191-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_w-1390p_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_w-1390p_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_w-1390p_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-191-0-0-0&quot;,&quot;id&quot;:&quot;15560422&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-191-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_w-1390p%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_w-1390p:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_w-1390p:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-191-0-1-0&quot;,&quot;id&quot;:&quot;15560423&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:192,&quot;dataTestId&quot;:&quot;vuln-software-config-192&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-192-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-192-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_w-1390t_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_w-1390t_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_w-1390t_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-192-0-0-0&quot;,&quot;id&quot;:&quot;15560424&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-192-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_w-1390t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_w-1390t:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_w-1390t:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-192-0-1-0&quot;,&quot;id&quot;:&quot;15560425&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:193,&quot;dataTestId&quot;:&quot;vuln-software-config-193&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-193-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-193-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_w-10855m_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_w-10855m_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_w-10855m_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-193-0-0-0&quot;,&quot;id&quot;:&quot;15560450&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-193-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_w-10855m%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_w-10855m:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_w-10855m:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-193-0-1-0&quot;,&quot;id&quot;:&quot;15560451&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:194,&quot;dataTestId&quot;:&quot;vuln-software-config-194&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-194-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-194-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_w-10885m_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_w-10885m_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_w-10885m_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-194-0-0-0&quot;,&quot;id&quot;:&quot;15560452&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-194-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_w-10885m%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_w-10885m:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_w-10885m:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-194-0-1-0&quot;,&quot;id&quot;:&quot;15560453&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:195,&quot;dataTestId&quot;:&quot;vuln-software-config-195&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-195-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-195-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_w-1250_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_w-1250_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_w-1250_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-195-0-0-0&quot;,&quot;id&quot;:&quot;15560454&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-195-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_w-1250%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_w-1250:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_w-1250:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-195-0-1-0&quot;,&quot;id&quot;:&quot;15560455&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:196,&quot;dataTestId&quot;:&quot;vuln-software-config-196&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-196-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-196-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_w-1250e_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_w-1250e_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_w-1250e_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-196-0-0-0&quot;,&quot;id&quot;:&quot;15560386&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-196-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_w-1250e%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_w-1250e:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_w-1250e:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-196-0-1-0&quot;,&quot;id&quot;:&quot;15560387&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:197,&quot;dataTestId&quot;:&quot;vuln-software-config-197&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-197-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-197-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_w-1250p_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_w-1250p_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_w-1250p_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-197-0-0-0&quot;,&quot;id&quot;:&quot;15560388&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-197-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_w-1250p%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_w-1250p:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_w-1250p:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-197-0-1-0&quot;,&quot;id&quot;:&quot;15560389&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:198,&quot;dataTestId&quot;:&quot;vuln-software-config-198&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-198-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-198-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_w-1250te_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_w-1250te_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_w-1250te_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-198-0-0-0&quot;,&quot;id&quot;:&quot;15560390&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-198-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_w-1250te%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_w-1250te:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_w-1250te:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-198-0-1-0&quot;,&quot;id&quot;:&quot;15560391&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:199,&quot;dataTestId&quot;:&quot;vuln-software-config-199&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-199-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-199-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_w-1270_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_w-1270_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_w-1270_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-199-0-0-0&quot;,&quot;id&quot;:&quot;15560392&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-199-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_w-1270%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_w-1270:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_w-1270:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-199-0-1-0&quot;,&quot;id&quot;:&quot;15560393&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:200,&quot;dataTestId&quot;:&quot;vuln-software-config-200&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-200-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-200-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_w-1270e_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_w-1270e_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_w-1270e_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-200-0-0-0&quot;,&quot;id&quot;:&quot;15560394&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-200-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_w-1270e%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_w-1270e:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_w-1270e:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-200-0-1-0&quot;,&quot;id&quot;:&quot;15560395&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:201,&quot;dataTestId&quot;:&quot;vuln-software-config-201&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-201-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-201-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_w-1270p_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_w-1270p_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_w-1270p_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-201-0-0-0&quot;,&quot;id&quot;:&quot;15560396&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-201-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_w-1270p%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_w-1270p:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_w-1270p:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-201-0-1-0&quot;,&quot;id&quot;:&quot;15560397&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:202,&quot;dataTestId&quot;:&quot;vuln-software-config-202&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-202-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-202-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_w-1270te_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_w-1270te_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_w-1270te_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-202-0-0-0&quot;,&quot;id&quot;:&quot;15560398&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-202-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_w-1270te%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_w-1270te:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_w-1270te:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-202-0-1-0&quot;,&quot;id&quot;:&quot;15560399&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:203,&quot;dataTestId&quot;:&quot;vuln-software-config-203&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-203-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-203-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_w-1290_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_w-1290_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_w-1290_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-203-0-0-0&quot;,&quot;id&quot;:&quot;15560400&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-203-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_w-1290%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_w-1290:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_w-1290:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-203-0-1-0&quot;,&quot;id&quot;:&quot;15560401&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:204,&quot;dataTestId&quot;:&quot;vuln-software-config-204&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-204-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-204-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_w-1290e_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_w-1290e_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_w-1290e_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-204-0-0-0&quot;,&quot;id&quot;:&quot;15560402&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-204-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_w-1290e%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_w-1290e:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_w-1290e:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-204-0-1-0&quot;,&quot;id&quot;:&quot;15560403&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:205,&quot;dataTestId&quot;:&quot;vuln-software-config-205&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-205-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-205-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_w-1290p_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_w-1290p_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_w-1290p_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-205-0-0-0&quot;,&quot;id&quot;:&quot;15560404&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-205-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_w-1290p%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_w-1290p:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_w-1290p:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-205-0-1-0&quot;,&quot;id&quot;:&quot;15560405&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:206,&quot;dataTestId&quot;:&quot;vuln-software-config-206&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-206-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-206-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_w-1290t_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_w-1290t_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_w-1290t_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-206-0-0-0&quot;,&quot;id&quot;:&quot;15560406&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-206-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_w-1290t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_w-1290t:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_w-1290t:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-206-0-1-0&quot;,&quot;id&quot;:&quot;15560407&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:207,&quot;dataTestId&quot;:&quot;vuln-software-config-207&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-207-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-207-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_w-1290te_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_w-1290te_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_w-1290te_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-207-0-0-0&quot;,&quot;id&quot;:&quot;15560408&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-207-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_w-1290te%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_w-1290te:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_w-1290te:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-207-0-1-0&quot;,&quot;id&quot;:&quot;15560409&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:208,&quot;dataTestId&quot;:&quot;vuln-software-config-208&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-208-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-208-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_w-2223_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_w-2223_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_w-2223_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-208-0-0-0&quot;,&quot;id&quot;:&quot;15560426&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-208-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_w-2223%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_w-2223:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_w-2223:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-208-0-1-0&quot;,&quot;id&quot;:&quot;15560427&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:209,&quot;dataTestId&quot;:&quot;vuln-software-config-209&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-209-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-209-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_w-2225_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_w-2225_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_w-2225_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-209-0-0-0&quot;,&quot;id&quot;:&quot;15560428&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-209-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_w-2225%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_w-2225:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_w-2225:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-209-0-1-0&quot;,&quot;id&quot;:&quot;15560429&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:210,&quot;dataTestId&quot;:&quot;vuln-software-config-210&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-210-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-210-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_w-2235_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_w-2235_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_w-2235_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-210-0-0-0&quot;,&quot;id&quot;:&quot;15560430&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-210-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_w-2235%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_w-2235:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_w-2235:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-210-0-1-0&quot;,&quot;id&quot;:&quot;15560431&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:211,&quot;dataTestId&quot;:&quot;vuln-software-config-211&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-211-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-211-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_w-2245_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_w-2245_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_w-2245_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-211-0-0-0&quot;,&quot;id&quot;:&quot;15560432&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-211-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_w-2245%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_w-2245:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_w-2245:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-211-0-1-0&quot;,&quot;id&quot;:&quot;15560433&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:212,&quot;dataTestId&quot;:&quot;vuln-software-config-212&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-212-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-212-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_w-2255_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_w-2255_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_w-2255_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-212-0-0-0&quot;,&quot;id&quot;:&quot;15560434&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-212-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_w-2255%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_w-2255:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_w-2255:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-212-0-1-0&quot;,&quot;id&quot;:&quot;15560435&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:213,&quot;dataTestId&quot;:&quot;vuln-software-config-213&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-213-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-213-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_w-2265_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_w-2265_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_w-2265_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-213-0-0-0&quot;,&quot;id&quot;:&quot;15560436&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-213-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_w-2265%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_w-2265:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_w-2265:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-213-0-1-0&quot;,&quot;id&quot;:&quot;15560437&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:214,&quot;dataTestId&quot;:&quot;vuln-software-config-214&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-214-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-214-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_w-2275_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_w-2275_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_w-2275_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-214-0-0-0&quot;,&quot;id&quot;:&quot;15560438&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-214-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_w-2275%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_w-2275:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_w-2275:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-214-0-1-0&quot;,&quot;id&quot;:&quot;15560439&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:215,&quot;dataTestId&quot;:&quot;vuln-software-config-215&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-215-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-215-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_w-2295_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_w-2295_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_w-2295_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-215-0-0-0&quot;,&quot;id&quot;:&quot;15560440&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-215-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_w-2295%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_w-2295:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_w-2295:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-215-0-1-0&quot;,&quot;id&quot;:&quot;15560441&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:216,&quot;dataTestId&quot;:&quot;vuln-software-config-216&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-216-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-216-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_w-3223_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_w-3223_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_w-3223_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-216-0-0-0&quot;,&quot;id&quot;:&quot;15560442&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-216-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_w-3223%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_w-3223:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_w-3223:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-216-0-1-0&quot;,&quot;id&quot;:&quot;15560443&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:217,&quot;dataTestId&quot;:&quot;vuln-software-config-217&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-217-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-217-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_w-3225_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_w-3225_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_w-3225_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-217-0-0-0&quot;,&quot;id&quot;:&quot;15560444&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-217-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_w-3225%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_w-3225:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_w-3225:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-217-0-1-0&quot;,&quot;id&quot;:&quot;15560445&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:218,&quot;dataTestId&quot;:&quot;vuln-software-config-218&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-218-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-218-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_w-3235_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_w-3235_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_w-3235_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-218-0-0-0&quot;,&quot;id&quot;:&quot;15560446&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-218-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_w-3235%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_w-3235:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_w-3235:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-218-0-1-0&quot;,&quot;id&quot;:&quot;15560447&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:219,&quot;dataTestId&quot;:&quot;vuln-software-config-219&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-219-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-219-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_w-3245_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_w-3245_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_w-3245_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-219-0-0-0&quot;,&quot;id&quot;:&quot;15560448&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-219-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_w-3245%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_w-3245:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_w-3245:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-219-0-1-0&quot;,&quot;id&quot;:&quot;15560449&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:220,&quot;dataTestId&quot;:&quot;vuln-software-config-220&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-220-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-220-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_w-3245m_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_w-3245m_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_w-3245m_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-220-0-0-0&quot;,&quot;id&quot;:&quot;15560358&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-220-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_w-3245m%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_w-3245m:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_w-3245m:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-220-0-1-0&quot;,&quot;id&quot;:&quot;15560359&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:221,&quot;dataTestId&quot;:&quot;vuln-software-config-221&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-221-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-221-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_w-3265_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_w-3265_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_w-3265_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-221-0-0-0&quot;,&quot;id&quot;:&quot;15560360&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-221-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_w-3265%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_w-3265:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_w-3265:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-221-0-1-0&quot;,&quot;id&quot;:&quot;15560361&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:222,&quot;dataTestId&quot;:&quot;vuln-software-config-222&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-222-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-222-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_w-3265m_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_w-3265m_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_w-3265m_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-222-0-0-0&quot;,&quot;id&quot;:&quot;15560362&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-222-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_w-3265m%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_w-3265m:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_w-3265m:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-222-0-1-0&quot;,&quot;id&quot;:&quot;15560363&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:223,&quot;dataTestId&quot;:&quot;vuln-software-config-223&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-223-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-223-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_w-3275_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_w-3275_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_w-3275_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-223-0-0-0&quot;,&quot;id&quot;:&quot;15560364&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-223-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_w-3275%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_w-3275:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_w-3275:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-223-0-1-0&quot;,&quot;id&quot;:&quot;15560365&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:224,&quot;dataTestId&quot;:&quot;vuln-software-config-224&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-224-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-224-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_w-3275m_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_w-3275m_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_w-3275m_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-224-0-0-0&quot;,&quot;id&quot;:&quot;15560366&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-224-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_w-3275m%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_w-3275m:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_w-3275m:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-224-0-1-0&quot;,&quot;id&quot;:&quot;15560367&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:225,&quot;dataTestId&quot;:&quot;vuln-software-config-225&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-225-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-225-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_w-3175x_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_w-3175x_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_w-3175x_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-225-0-0-0&quot;,&quot;id&quot;:&quot;15560368&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-225-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_w-3175x%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_w-3175x:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_w-3175x:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-225-0-1-0&quot;,&quot;id&quot;:&quot;15560369&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:226,&quot;dataTestId&quot;:&quot;vuln-software-config-226&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-226-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-226-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_w-2123_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_w-2123_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_w-2123_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-226-0-0-0&quot;,&quot;id&quot;:&quot;15560370&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-226-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_w-2123%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_w-2123:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_w-2123:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-226-0-1-0&quot;,&quot;id&quot;:&quot;15560371&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:227,&quot;dataTestId&quot;:&quot;vuln-software-config-227&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-227-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-227-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_w-2125_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_w-2125_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_w-2125_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-227-0-0-0&quot;,&quot;id&quot;:&quot;15560372&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-227-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_w-2125%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_w-2125:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_w-2125:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-227-0-1-0&quot;,&quot;id&quot;:&quot;15560373&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:228,&quot;dataTestId&quot;:&quot;vuln-software-config-228&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-228-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-228-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_w-2133_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_w-2133_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_w-2133_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-228-0-0-0&quot;,&quot;id&quot;:&quot;15560374&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-228-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_w-2133%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_w-2133:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_w-2133:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-228-0-1-0&quot;,&quot;id&quot;:&quot;15560375&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:229,&quot;dataTestId&quot;:&quot;vuln-software-config-229&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-229-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-229-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_w-2135_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_w-2135_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_w-2135_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-229-0-0-0&quot;,&quot;id&quot;:&quot;15560376&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-229-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_w-2135%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_w-2135:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_w-2135:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-229-0-1-0&quot;,&quot;id&quot;:&quot;15560377&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:230,&quot;dataTestId&quot;:&quot;vuln-software-config-230&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-230-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-230-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_w-2145_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_w-2145_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_w-2145_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-230-0-0-0&quot;,&quot;id&quot;:&quot;15560378&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-230-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_w-2145%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_w-2145:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_w-2145:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-230-0-1-0&quot;,&quot;id&quot;:&quot;15560379&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:231,&quot;dataTestId&quot;:&quot;vuln-software-config-231&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-231-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-231-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_w-2155_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_w-2155_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_w-2155_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-231-0-0-0&quot;,&quot;id&quot;:&quot;15560380&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-231-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_w-2155%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_w-2155:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_w-2155:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-231-0-1-0&quot;,&quot;id&quot;:&quot;15560381&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:232,&quot;dataTestId&quot;:&quot;vuln-software-config-232&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-232-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-232-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_w-2175_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_w-2175_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_w-2175_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-232-0-0-0&quot;,&quot;id&quot;:&quot;15560382&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-232-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_w-2175%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_w-2175:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_w-2175:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-232-0-1-0&quot;,&quot;id&quot;:&quot;15560383&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:233,&quot;dataTestId&quot;:&quot;vuln-software-config-233&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-233-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-233-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aintel%3Axeon_w-2195_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:intel:xeon_w-2195_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:intel:xeon_w-2195_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-233-0-0-0&quot;,&quot;id&quot;:&quot;15560384&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-233-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aintel%3Axeon_w-2195%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:intel:xeon_w-2195:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:intel:xeon_w-2195:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-233-0-1-0&quot;,&quot;id&quot;:&quot;15560385&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]}]"/>
<p id="vulnCpeInfo" >
<small>
<i class="fa fa-bug fa-flip-vertical"></i> Denotes Vulnerable Software<br />
<a href="mailto:cpe_dictionary@nist.gov">Are we missing a CPE here? Please let us know</a>.<br />
</small>
</p>
<script src="/site-media/js/vulnerability/cpe-match.js"
type="text/javascript"></script>
<script src="/site-media/js/vulnerability/configurationListing.js"
type="text/javascript"></script>
</div>
</div>
<div id="vulnChangeHistoryDiv"
data-testid="vuln-change-history-container">
<h3 id="VulnChangeHistorySection">Change History</h3>
<small> 3 change records found <a href="#VulnChangeHistorySection"
style="text-decoration: underline" id="changeHistoryToggle">show
changes</a>
</small>
<div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-0">CVE Modified by CVE</span> <span
data-testid="vuln-change-history-date-0">11/21/2024 1:54:36 AM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00717.html</pre>
<br/>
<br />
</td>
</tr>
</tbody>
</table>
</div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-1">CVE Modified by Intel Corporation</span> <span
data-testid="vuln-change-history-date-1">5/14/2024 6:27:24 AM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
</tbody>
</table>
</div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-2">Initial Analysis by NIST</span> <span
data-testid="vuln-change-history-date-2">3/06/2023 12:21:01 PM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CVSS V3.1</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">NIST AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CWE</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">NIST CWE-20</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:core_i3-11100he_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:core_i3-11100he:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:core_i3-1110g4_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:core_i3-1110g4:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:core_i3-1115g4_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:core_i3-1115g4:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:core_i3-1115g4_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:core_i3-1115g4:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:core_i3-1115g4e_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:core_i3-1115g4e:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:core_i3-1115gre_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:core_i3-1115gre:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:core_i3-1120g4_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:core_i3-1120g4:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:core_i3-1125g4_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:core_i3-1125g4:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:core_i3-1125g4_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:core_i3-1125g4:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:core_i5-11260h_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:core_i5-11260h:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:core_i5-11300h_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:core_i5-11300h:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:core_i5-1130g7_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:core_i5-1130g7:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:core_i5-11320h_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:core_i5-11320h:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:core_i5-1135g7_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:core_i5-1135g7:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:core_i5-1135g7_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:core_i5-1135g7:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:core_i5-11400_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:core_i5-11400:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:core_i5-11400f_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:core_i5-11400f:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:core_i5-11400h_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:core_i5-11400h:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:core_i5-11400t_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:core_i5-11400t:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:core_i5-1140g7_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:core_i5-1140g7:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:core_i5-1145g7_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:core_i5-1145g7:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:core_i5-1145g7e_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:core_i5-1145g7e:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:core_i5-1145gre_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:core_i5-1145gre:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:core_i5-11500_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:core_i5-11500:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:core_i5-11500h_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:core_i5-11500h:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:core_i5-11500he_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:core_i5-11500he:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:core_i5-11500t_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:core_i5-11500t:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:core_i5-1155g7_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:core_i5-1155g7:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:core_i5-1155g7_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:core_i5-1155g7:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:core_i5-11600_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:core_i5-11600:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:core_i5-11600k_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:core_i5-11600k:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:core_i5-11600kf_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:core_i5-11600kf:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:core_i5-11600t_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:core_i5-11600t:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:core_i7-11370h_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:core_i7-11370h:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:core_i7-11375h_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:core_i7-11375h:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:core_i7-11390h_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:core_i7-11390h:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:core_i7-11600h_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:core_i7-11600h:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:core_i7-1160g7_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:core_i7-1160g7:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:core_i7-1165g7_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:core_i7-1165g7:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:core_i7-1165g7_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:core_i7-1165g7:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:core_i7-11700_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:core_i7-11700:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:core_i7-11700f_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:core_i7-11700f:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:core_i7-11700k_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:core_i7-11700k:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:core_i7-11700kf_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:core_i7-11700kf:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:core_i7-11700t_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:core_i7-11700t:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:core_i7-11800h_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:core_i7-11800h:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:core_i7-1180g7_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:core_i7-1180g7:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:core_i7-11850h_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:core_i7-11850h:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:core_i7-11850he_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:core_i7-11850he:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:core_i7-1185g7_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:core_i7-1185g7:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:core_i7-1185g7e_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:core_i7-1185g7e:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:core_i7-1185gre_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:core_i7-1185gre:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:core_i7-1195g7_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:core_i7-1195g7:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:core_i7-1195g7_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:core_i7-1195g7:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:core_i9-11900_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:core_i9-11900:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:core_i9-11900f_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:core_i9-11900f:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:core_i9-11900h_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:core_i9-11900h:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:core_i9-11900k_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:core_i9-11900k:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:core_i9-11900kf_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:core_i9-11900kf:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:core_i9-11900t_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:core_i9-11900t:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:core_i9-11950h_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:core_i9-11950h:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:core_i9-11980hk_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:core_i9-11980hk:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_e-2124_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_e-2124:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_e-2124g_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_e-2124g:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_e-2126g_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_e-2126g:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_e-2134_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_e-2134:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_e-2136_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_e-2136:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_e-2144g_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_e-2144g:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_e-2146g_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_e-2146g:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_e-2174g_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_e-2174g:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_e-2176g_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_e-2176g:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_e-2176m_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_e-2176m:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_e-2186g_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_e-2186g:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_e-2186m_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_e-2186m:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_e-2224_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_e-2224:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_e-2224g_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_e-2224g:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_e-2226g_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_e-2226g:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_e-2226ge_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_e-2226ge:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_e-2234_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_e-2234:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_e-2236_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_e-2236:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_e-2244g_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_e-2244g:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_e-2246g_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_e-2246g:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_e-2254me_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_e-2254me:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_e-2254ml_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_e-2254ml:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_e-2274g_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_e-2274g:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_e-2276g_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_e-2276g:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_e-2276m_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_e-2276m:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_e-2276me_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_e-2276me:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_e-2276ml_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_e-2276ml:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_e-2278g_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_e-2278g:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_e-2278ge_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_e-2278ge:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_e-2278gel_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_e-2278gel:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_e-2286g_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_e-2286g:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_e-2286m_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_e-2286m:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_e-2288g_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_e-2288g:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_e-2314_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_e-2314:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_e-2324g_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_e-2324g:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_e-2334_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_e-2334:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_e-2336_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_e-2336:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_e-2356g_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_e-2356g:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_e-2374g_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_e-2374g:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_e-2378_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_e-2378:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_e-2378g_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_e-2378g:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_e-2386g_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_e-2386g:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_e-2388g_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_e-2388g:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_gold_5317_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_gold_5317:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_gold_5318h_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_gold_5318h:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_gold_5318n_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_gold_5318n:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_gold_5318s_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_gold_5318s:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_gold_5318y_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_gold_5318y:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_gold_5320_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_gold_5320:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_gold_5320h_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_gold_5320h:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_gold_5320t_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_gold_5320t:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_gold_6312u_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_gold_6312u:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_gold_6314u_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_gold_6314u:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_gold_6326_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_gold_6326:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_gold_6328h_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_gold_6328h:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_gold_6328hl_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_gold_6328hl:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_gold_6330_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_gold_6330:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_gold_6330h_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_gold_6330h:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_gold_6330n_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_gold_6330n:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_gold_6334_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_gold_6334:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_gold_6336y_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_gold_6336y:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_gold_6338_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_gold_6338:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_gold_6338n_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_gold_6338n:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_gold_6338t_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_gold_6338t:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_gold_6342_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_gold_6342:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_gold_6346_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_gold_6346:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_gold_6348_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_gold_6348:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_gold_6348h_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_gold_6348h:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_gold_6354_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_gold_6354:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_platinum_8351n_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_platinum_8351n:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_platinum_8352m_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_platinum_8352m:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_platinum_8352s_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_platinum_8352s:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_platinum_8352v_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_platinum_8352v:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_platinum_8352y_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_platinum_8352y:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_platinum_8353h_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_platinum_8353h:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_platinum_8354h_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_platinum_8354h:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_platinum_8356h_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_platinum_8356h:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_platinum_8358_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_platinum_8358:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_platinum_8358p_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_platinum_8358p:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_platinum_8360h_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_platinum_8360h:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_platinum_8360hl_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_platinum_8360hl:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_platinum_8360y_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_platinum_8360y:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_platinum_8362_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_platinum_8362:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_platinum_8368_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_platinum_8368:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_platinum_8368q_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_platinum_8368q:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_platinum_8376h_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_platinum_8376h:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_platinum_8376hl_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_platinum_8376hl:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_platinum_8380_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_platinum_8380:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_platinum_8380h_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_platinum_8380h:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_platinum_8380hl_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_platinum_8380hl:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_silver_4309y_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_silver_4309y:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_silver_4310_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_silver_4310:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_silver_4310t_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_silver_4310t:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_silver_4314_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_silver_4314:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_silver_4316_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_silver_4316:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_w-10855m_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_w-10855m:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_w-10885m_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_w-10885m:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_w-11155mle_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_w-11155mle:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_w-11155mre_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_w-11155mre:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_w-11555mle_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_w-11555mle:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_w-11555mre_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_w-11555mre:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_w-11855m_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_w-11855m:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_w-11865mle_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_w-11865mle:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_w-11865mre_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_w-11865mre:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_w-11955m_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_w-11955m:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_w-1250_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_w-1250:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_w-1250e_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_w-1250e:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_w-1250p_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_w-1250p:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_w-1250te_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_w-1250te:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_w-1270_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_w-1270:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_w-1270e_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_w-1270e:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_w-1270p_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_w-1270p:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_w-1270te_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_w-1270te:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_w-1290_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_w-1290:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_w-1290e_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_w-1290e:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_w-1290p_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_w-1290p:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_w-1290t_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_w-1290t:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_w-1290te_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_w-1290te:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_w-1350_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_w-1350:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_w-1350p_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_w-1350p:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_w-1370_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_w-1370:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_w-1370p_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_w-1370p:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_w-1390_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_w-1390:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_w-1390p_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_w-1390p:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_w-1390t_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_w-1390t:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_w-2123_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_w-2123:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_w-2125_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_w-2125:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_w-2133_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_w-2133:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_w-2135_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_w-2135:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_w-2145_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_w-2145:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_w-2155_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_w-2155:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_w-2175_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_w-2175:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_w-2195_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_w-2195:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_w-2223_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_w-2223:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_w-2225_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_w-2225:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_w-2235_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_w-2235:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_w-2245_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_w-2245:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_w-2255_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_w-2255:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_w-2265_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_w-2265:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_w-2275_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_w-2275:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_w-2295_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_w-2295:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_w-3175x_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_w-3175x:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_w-3223_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_w-3223:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_w-3225_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_w-3225:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_w-3235_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_w-3235:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_w-3245_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_w-3245:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_w-3245m_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_w-3245m:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_w-3265_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_w-3265:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_w-3265m_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_w-3265m:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_w-3275_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_w-3275:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_w-3275m_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_w-3275m:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_w-3323_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_w-3323:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_w-3335_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_w-3335:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_w-3345_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_w-3345:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_w-3365_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_w-3365:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_w-3375_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_w-3375:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_w3-2423_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_w3-2423:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_w3-2425_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_w3-2425:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_w3-2435_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_w3-2435:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_w5-2445_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_w5-2445:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_w5-2455x_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_w5-2455x:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_w5-2465x_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_w5-2465x:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_w5-3425_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_w5-3425:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_w5-3435x_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_w5-3435x:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_w7-2475x_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_w7-2475x:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_w7-2495x_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_w7-2495x:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_w7-3445_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_w7-3445:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_w7-3455_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_w7-3455:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_w7-3465x_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_w7-3465x:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_w9-3475x_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_w9-3475x:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">CPE Configuration</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:intel:xeon_w9-3495x_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:intel:xeon_w9-3495x:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Changed</td>
<td
data-testid="vuln-change-history-2-type">Reference Type</td>
<td data-testid="vuln-change-history-2-old">
<pre style="word-break: break-all !important">http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00717.html No Types Assigned</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00717.html Vendor Advisory</pre>
<br/>
<br />
</td>
</tr>
</tbody>
</table>
</div>
</div>
</div>
</div>
</div>
<div class="col-lg-3 col-md-5 col-sm-12">
<div class="bs-callout bs-callout-info">
<h4>Quick Info</h4>
<strong>CVE Dictionary Entry:</strong><br/> <a
target="_blank" rel="noopener noreferrer" data-testid="vuln-cve-dictionary-entry"
href="https://cve.org/CVERecord?id=CVE-2022-26837">CVE-2022-26837</a><br/> <strong>NVD
Published Date:</strong><br/> <span
data-testid="vuln-published-on">02/16/2023</span><br/> <strong>NVD
Last Modified:</strong><br/> <span
data-testid="vuln-last-modified-on">11/21/2024</span><br/> <strong>
Source:</strong><br/> <span
data-testid="vuln-current-description-source">Intel Corporation</span><br/>
</div>
</div>
</div>
</td>
</tr>
</table>
</div>
<!-- Hidden input for padding -->
<input type="hidden" value="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" id="padding" name="padding"/>
</div>
</div>
</div>
</main>
<footer id="footer" role="contentinfo">
<div class="container">
<div class="row">
<div class="col-sm-12">
<ul class="social-list pull-right">
<li class="field-item service-twitter list-horiz"><a
href="https://twitter.com/NISTCyber" target="_blank" rel="noopener noreferrer"
class="social-btn social-btn--large extlink ext"> <i
class="fa fa-twitter fa-fw"><span class="element-invisible">twitter</span></i><span
class="ext"><span class="element-invisible"> (link
is external)</span></span>
</a></li>
<li class="field-item service-facebook list-horiz"><a
href="https://www.facebook.com/NIST" target="_blank" rel="noopener noreferrer"
class="social-btn social-btn--large extlink ext"> <i
class="fa fa-facebook fa-fw"><span class="element-invisible">facebook</span></i><span
class="ext"><span class="element-invisible"> (link
is external)</span></span></a></li>
<li class="field-item service-linkedin list-horiz"><a
href="https://www.linkedin.com/company/nist" target="_blank" rel="noopener noreferrer"
class="social-btn social-btn--large extlink ext"> <i
class="fa fa-linkedin fa-fw"><span class="element-invisible">linkedin</span></i><span
class="ext"><span class="element-invisible"> (link
is external)</span></span></a></li>
<li class="field-item service-youtube list-horiz"><a
href="https://www.youtube.com/user/USNISTGOV" target="_blank" rel="noopener noreferrer"
class="social-btn social-btn--large extlink ext"> <i
class="fa fa-youtube fa-fw"><span class="element-invisible">youtube</span></i><span
class="ext"><span class="element-invisible"> (link
is external)</span></span></a></li>
<li class="field-item service-rss list-horiz"><a
href="https://www.nist.gov/news-events/nist-rss-feeds"
target="_blank" rel="noopener noreferrer" class="social-btn social-btn--large extlink">
<i class="fa fa-rss fa-fw"><span class="element-invisible">rss</span></i>
</a></li>
<li class="field-item service-govdelivery list-horiz last"><a
href="https://public.govdelivery.com/accounts/USNIST/subscriber/new?qsp=USNIST_3"
target="_blank" rel="noopener noreferrer" class="social-btn social-btn--large extlink ext">
<i class="fa fa-envelope fa-fw"><span
class="element-invisible">govdelivery</span></i><span class="ext"><span
class="element-invisible"> (link is external)</span></span>
</a></li>
</ul>
<span class="hidden-xs"> <a
title="National Institute of Standards and Technology" rel="home"
class="footer-nist-logo"> <img
src="/site-media/images/nist/nist-logo.png"
alt="National Institute of Standards and Technology logo" />
</a>
</span>
</div>
</div>
<div class="row hidden-sm hidden-md hidden-lg">
<div class="col-sm-12">
<a href="https://www.nist.gov"
title="National Institute of Standards and Technology" rel="home"
target="_blank" rel="noopener noreferrer" class="footer-nist-logo"> <img
src="/site-media/images/nist/nist-logo.png"
alt="National Institute of Standards and Technology logo" />
</a>
</div>
</div>
<div class="row footer-contact-container">
<div class="col-sm-6">
<strong>HEADQUARTERS</strong>
<br>
100 Bureau Drive
<br>
Gaithersburg, MD 20899
<br>
<a href="tel:301-975-2000">(301) 975-2000</a>
<br>
<br>
<a href="mailto:nvd@nist.gov">Webmaster</a> | <a
href="https://www.nist.gov/about-nist/contact-us">Contact Us</a>
| <a href="https://www.nist.gov/about-nist/visit"
style="display: inline-block;">Our Other Offices</a>
</div>
<div class="col-sm-6">
<div class="pull-right"
style="text-align:right">
<strong>Incident Response Assistance and Non-NVD Related<br>Technical Cyber Security Questions:</strong>
<br>
US-CERT Security Operations Center
<br> Email: <a href="mailto:soc@us-cert.gov">soc@us-cert.gov</a>
<br> Phone: 1-888-282-0870
</div>
</div>
</div>
<div class="row">
<nav title="Footer Navigation" role="navigation"
class="row footer-bottom-links-container">
<!-- https://github.com/usnistgov/nist-header-footer/blob/nist-pages/boilerplate-footer.html -->
<p>
<a href="https://www.nist.gov/oism/site-privacy">Site Privacy</a>
|
<a href="https://www.nist.gov/oism/accessibility">Accessibility</a>
|
<a href="https://www.nist.gov/privacy">Privacy Program</a>
|
<a href="https://www.nist.gov/oism/copyrights">Copyrights</a>
|
<a href="https://www.commerce.gov/vulnerability-disclosure-policy">Vulnerability Disclosure</a>
|
<a href="https://www.nist.gov/no-fear-act-policy">No Fear Act Policy</a>
|
<a href="https://www.nist.gov/foia">FOIA</a>
|
<a href="https://www.nist.gov/environmental-policy-statement">Environmental Policy</a>
|
<a href="https://www.nist.gov/summary-report-scientific-integrity">Scientific Integrity</a>
|
<a href="https://www.nist.gov/nist-information-quality-standards">Information Quality Standards</a>
|
<a href="https://www.commerce.gov/">Commerce.gov</a>
|
<a href="https://www.science.gov/">Science.gov</a>
|
<a href="https://www.usa.gov/">USA.gov</a>
</p>
</nav>
</div>
</div>
</footer>
</body>
</html>