nist-gov/nvd.nist.gov/vuln/detail/CVE-2022-29900
2025-03-07 17:19:30 +00:00

7007 lines
508 KiB
Text
Raw Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

<!DOCTYPE html>
<html lang="en">
<head>
<title>NVD - CVE-2022-29900</title>
<meta http-equiv="content-type" content="text/html; charset=UTF-8" />
<meta http-equiv="content-style-type" content="text/css" />
<meta http-equiv="content-script-type" content="text/javascript" />
<meta name="viewport" content="width=device-width, initial-scale=1.0" />
<link href="/site-scripts/font-awesome/css/font-awesome.min.css"
type="text/css" rel="stylesheet" />
<link href="/site-media/bootstrap/css/bootstrap.min.css"
type="text/css" rel="stylesheet" />
<link href="/site-media/bootstrap/css/bootstrap-theme.min.css"
type="text/css" rel="stylesheet" />
<link
href="/site-scripts/eonasdan-bootstrap-datetimepicker/build/css/bootstrap-datetimepicker.min.css"
type="text/css" rel="stylesheet" />
<link href="/site-media/css/nist-fonts.css" type="text/css"
rel="stylesheet" />
<link href="/site-media/css/base-style.css" type="text/css"
rel="stylesheet" />
<link href="/site-media/css/media-resize.css" type="text/css"
rel="stylesheet" />
<meta name="theme-color" content="#000000">
<script src="/site-scripts/jquery/dist/jquery.min.js"
type="text/javascript"></script>
<script src="/site-scripts/jquery-visible/jquery.visible.min.js"
type="text/javascript"></script>
<script src="/site-scripts/underscore/underscore-min.js"
type="text/javascript"></script>
<script src="/site-media/bootstrap/js/bootstrap.js"
type="text/javascript"></script>
<script src="/site-scripts/moment/min/moment.min.js"
type="text/javascript"></script>
<script
src="/site-scripts/eonasdan-bootstrap-datetimepicker/build/js/bootstrap-datetimepicker.min.js"
type="text/javascript"></script>
<script src="/site-media/js/megamenu.js" type="text/javascript"></script>
<script src="/site-media/js/nist-exit-script.js"
type="text/javascript"></script>
<script src="/site-media/js/forms.js" type="text/javascript"></script>
<script
src="/site-media/js/federated-analytics.all.min.js?agency=NIST&amp;subagency=nvd&amp;pua=UA-37115410-41&amp;yt=true"
type="text/javascript" id="_fed_an_js_tag"></script>
<!-- Google tag (gtag.js) -->
<script async src="https://www.googletagmanager.com/gtag/js?id=G-4KKFZP12LQ"></script>
<script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-4KKFZP12LQ'); </script>
<style id="antiClickjack">
body>* {
display: none !important;
}
#antiClickjack {
display: block !important;
}
</style>
<noscript>
<style id="antiClickjackNoScript">
body>* {
display: block !important;
}
#antiClickjack {
display: none !important;
}
</style>
</noscript>
<script type="text/javascript" id="antiClickjackScript">
if (self === top) {
// no clickjacking
var antiClickjack = document.getElementById("antiClickjack");
antiClickjack.parentNode.removeChild(antiClickjack);
} else {
setTimeout(tryForward(), 5000);
}
function tryForward() {
top.location = self.location;
}
</script>
<meta charset="UTF-8">
<link href="/site-media/css/nvd-style.css" type="text/css"
rel="stylesheet" />
<link href="/site-media/images/favicons/apple-touch-icon.png"
rel="apple-touch-icon" type="image/png" sizes="180x180" />
<link href="/site-media/images/favicons/favicon-32x32.png"
rel="icon" type="image/png" sizes="32x32" />
<link href="/site-media/images/favicons/favicon-16x16.png"
rel="icon" type="image/png" sizes="16x16" />
<link href="/site-media/images/favicons/manifest.json"
rel="manifest" />
<link href="/site-media/images/favicons/safari-pinned-tab.svg"
rel="mask-icon" color="#000000" />
<link href="/site-media/images/favicons/favicon.ico"
rel="shortcut icon" />
<meta name="msapplication-config" content="/site-media/images/favicons/browserconfig.xml" />
<link href="/site-media/images/favicons/favicon.ico"
rel="shortcut icon" type="image/x-icon" />
<link href="/site-media/images/favicons/favicon.ico" rel="icon"
type="image/x-icon" />
<meta charset="UTF-8">
<script src="/site-media/js/vulnerability/vulnDetail.js"
type="text/javascript"></script>
<script src="/site-media/js/vulnerability/cvssVulnDetail.js"
type="text/javascript"></script>
</head>
<body>
<header role="banner" title="Site Banner">
<div id="antiClickjack" style="display: none">
<h1>You are viewing this page in an unauthorized frame window.</h1>
<p>
This is a potential security issue, you are being redirected to
<a href="https://nvd.nist.gov">https://nvd.nist.gov</a>
</p>
</div>
<div>
<section class="usa-banner" aria-label="Official government website">
<div class="usa-accordion container">
<header class="usa-banner__header">
<noscript>
<p style="font-size: 0.85rem; font-weight: bold;">You have JavaScript disabled. This site requires JavaScript to be enabled for complete site functionality.</p>
</noscript>
<img class="usa-banner__header-flag"
src="/site-media/images/usbanner/us_flag_small.png" alt="U.S. flag">
&nbsp;
<span class="usa-banner__header-text">An official website of the United States government</span>
<button id="gov-banner-button" class="usa-accordion__button usa-banner__button" data-toggle="collapse" data-target="#gov-banner" aria-expanded="false" aria-controls="gov-banner">
<span class="usa-banner__button-text">Here's how you know</span>
</button>
</header>
<div class="usa-banner__content usa-accordion__content collapse" role="tabpanel" id="gov-banner" aria-expanded="true">
<div class="row">
<div class="col-md-5 col-sm-12">
<div class="row">
<div class="col-sm-2 col-xs-3">
<img class="usa-banner__icon usa-media-block__img"
src="/site-media/images/usbanner/icon-dot-gov.svg" alt="Dot gov">
</div>
<div class="col-sm-10 col-xs-9">
<p>
<strong>Official websites use .gov</strong>
<br>
A <strong>.gov</strong> website belongs to an official government organization in the United States.
</p>
</div>
</div>
</div>
<div class="col-md-5 col-sm-12">
<div class="row">
<div class="col-sm-2 col-xs-3">
<img class="usa-banner__icon usa-media-block__img"
src="/site-media/images/usbanner/icon-https.svg" alt="Https">
</div>
<div class="col-sm-10 col-xs-9">
<p>
<strong>Secure .gov websites use HTTPS</strong>
<br>
A <strong>lock</strong> (<img class="usa-banner__lock"
src="/site-media/images/usbanner/lock.svg" alt="Dot gov">) or <strong>https://</strong> means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.
</p>
</div>
</div>
</div>
</div>
</div>
</div>
</section>
</div>
<div>
<div>
<nav id="navbar" class="navbar">
<div id="nist-menu-container" class="container">
<div class="row">
<!-- Brand -->
<div class="col-xs-6 col-md-4 navbar-header"
style="height:104px">
<a class="navbar-brand"
href="https://www.nist.gov"
target="_blank" rel="noopener noreferrer"
id="navbar-brand-image"
style="padding-top: 36px">
<img alt="National Institute of Standards and Technology"
src="/site-media/images/nist/nist-logo.svg"
width="110" height="30">
</a>
</div>
<div class="col-xs-6 col-md-8 navbar-nist-logo">
<span id="nvd-menu-button" class="pull-right" style="margin-top: 26px"> <a href="#">
<span class="fa fa-bars"></span> <span id="nvd-menu-full-text"><span
class="hidden-xxs">NVD </span>MENU</span>
</a>
</span>
</div>
</div>
</div>
<div class="main-menu-row container">
<!-- Collect the nav links, forms, and other content for toggling -->
<div id="main-menu-drop" class="col-lg-12" style="display: none;">
<ul>
<li><a href="/general"> General <span
class="expander fa fa-plus" id="nvd-header-menu-general"
data-expander-name="general" data-expanded="false"> <span
class="element-invisible">Expand or Collapse</span>
</span>
</a>
<div style="display: none;" class="sub-menu"
data-expander-trigger="general">
<div class="row">
<div class="col-lg-4">
<p>
<a href="/general/nvd-dashboard">NVD Dashboard</a>
</p>
<p>
<a href="https://www.nist.gov/itl/nvd">News and Status Updates</a>
</p>
</div>
<div class="col-lg-4">
<p>
<a href="/general/faq">FAQ</a>
</p>
</div>
<div class="col-lg-4">
<p>
<a href="/general/visualizations">Visualizations</a>
</p>
<p>
<a href="/general/legal-disclaimer">Legal Disclaimer</a>
</p>
</div>
</div>
</div></li>
<li><a href="/vuln"> Vulnerabilities <span
class="expander fa fa-plus"
id="nvd-header-menu-vulnerabilities"
data-expander-name="vulnerabilities" data-expanded="false">
<span class="element-invisible">Expand or Collapse</span>
</span>
</a>
<div style="display: none;" class="sub-menu"
data-expander-trigger="vulnerabilities">
<div class="row">
<div class="col-lg-4">
<p>
<a href="/vuln/search">Search &amp; Statistics</a>
</p>
<p>
<a href="/vuln/categories">Weakness Types</a>
</p>
</div>
<div class="col-lg-4">
<p>
<a href="/vuln/data-feeds">Legacy Data Feeds</a>
</p>
<p>
<a href="/vuln/vendor-comments">Vendor Comments</a>
</p>
</div>
<div class="col-lg-4">
<p>
<a href="/vuln/cvmap">CVMAP</a>
</p>
</div>
</div>
</div></li>
<li><a href="/vuln-metrics/cvss#"> Vulnerability Metrics <span
class="expander fa fa-plus" id="nvd-header-menu-metrics"
data-expander-name="metrics" data-expanded="false"> <span
class="element-invisible">Expand or Collapse</span>
</span>
</a>
<div style="display: none;" class="sub-menu"
data-expander-trigger="metrics">
<div class="row">
<div class="col-lg-4">
<p>
<a href="/vuln-metrics/cvss/v4-calculator">CVSS v4.0
Calculators</a>
</p>
</div>
<div class="col-lg-4">
<p>
<a href="/vuln-metrics/cvss/v3-calculator">CVSS v3.x
Calculators</a>
</p>
</div>
<div class="col-lg-4">
<p>
<a href="/vuln-metrics/cvss/v2-calculator">CVSS v2.0
Calculator</a>
</p>
</div>
</div>
</div></li>
<li><a href="/products"> Products <span
class="expander fa fa-plus" id="nvd-header-menu-products"
data-expander-name="products" data-expanded="false"> <span
class="element-invisible">Expand or Collapse</span>
</span>
</a>
<div style="display: none;" class="sub-menu"
data-expander-trigger="products">
<div class="row">
<div class="col-lg-4">
<p>
<a href="/products/cpe">CPE Dictionary</a>
</p>
<p>
<a href="/products/cpe/search">CPE Search</a>
</p>
</div>
<div class="col-lg-4">
<p>
<a href="/products/cpe/statistics">CPE Statistics</a>
</p>
<p>
<a href="/products/swid">SWID</a>
</p>
</div>
<div class="col-lg-4"></div>
</div>
</div></li>
<li>
<a href="/developers">Developers<span
class="expander fa fa-plus" id="nvd-header-menu-developers"
data-expander-name="developers" data-expanded="false"> <span
class="element-invisible">Expand or Collapse</span>
</span>
</a>
<div style="display: none;" class="sub-menu"
data-expander-trigger="developers">
<div class="row">
<div class="col-lg-4">
<p>
<a href="/developers/start-here">Start Here</a>
</p>
<p>
<a href="/developers/request-an-api-key">Request an API Key</a>
</p>
</div>
<div class="col-lg-4">
<p>
<a href="/developers/vulnerabilities">Vulnerabilities</a>
</p>
<p>
<a href="/developers/products">Products</a>
</p>
</div>
<div class="col-lg-4">
<p>
<a href="/developers/data-sources">Data Sources</a>
</p>
<p>
<a href="/developers/terms-of-use">Terms of Use</a>
</p>
</div>
</div>
</div>
</li>
<li><a href="/contact"> Contact NVD </a></li>
<li><a href="/other"> Other Sites <span
class="expander fa fa-plus" id="nvd-header-menu-othersites"
data-expander-name="otherSites" data-expanded="false"> <span
class="element-invisible">Expand or Collapse</span>
</span>
</a>
<div style="display: none;" class="sub-menu"
data-expander-trigger="otherSites">
<div class="row">
<div class="col-lg-4">
<p>
<a href="https://ncp.nist.gov">Checklist (NCP) Repository</a>
</p>
<p>
<a href="https://ncp.nist.gov/cce">Configurations (CCE)</a>
</p>
<p>
<a href="https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search">800-53 Controls</a>
</p>
</div>
<div class="col-lg-4">
<p>
<a
href="https://csrc.nist.gov/projects/scap-validation-program">SCAP
Validated Tools</a>
</p>
<p>
<a
href="https://csrc.nist.gov/projects/security-content-automation-protocol">SCAP</a>
</p>
</div>
<div class="col-lg-4">
<p>
<a
href="https://csrc.nist.gov/projects/united-states-government-configuration-baseline">USGCB</a>
</p>
</div>
</div>
</div></li>
<li><a href="/search"> Search <span
class="expander fa fa-plus" id="nvd-header-menu-search"
data-expander-name="search" data-expanded="false"> <span
class="element-invisible">Expand or Collapse</span>
</span>
</a>
<div style="display: none;" class="sub-menu"
data-expander-trigger="search">
<div class="row">
<div class="col-lg-4">
<p>
<a href="/vuln/search">Vulnerability Search</a>
</p>
</div>
<div class="col-lg-4">
<p>
<a href="/products/cpe/search">CPE Search</a>
</p>
</div>
</div>
</div></li>
</ul>
</div>
<!-- /#mobile-nav-container -->
</div>
</nav>
<section id="itl-header" class="has-menu">
<div class="container">
<div class="row">
<div class="col-sm-12 col-md-8">
<h2 class="hidden-xs hidden-sm">
<a href="https://www.nist.gov/itl" target="_blank" rel="noopener noreferrer">Information Technology Laboratory</a>
</h2>
<h1 class="hidden-xs hidden-sm">
<a id="nvd-header-link"
href="/">National Vulnerability Database</a>
</h1>
<h1 class="hidden-xs text-center hidden-md hidden-lg"
>National Vulnerability Database</h1>
<h1 class="hidden-sm hidden-md hidden-lg text-center"
>NVD</h1>
</div>
<div class="col-sm-12 col-md-4">
<a style="width: 100%; text-align: center; display: block;padding-top: 14px">
<img id="img-logo-nvd-lg"
alt="National Vulnerability Database"
src="/site-media/images/F_NIST-Logo-NVD-white.svg"
width="500" height="100">
</a>
</div>
</div>
</div>
</section>
</div>
</div>
</header>
<main>
<div>
<div id="body-section" class="container">
<div class="row">
<ol class="breadcrumb">
<li><a href="/vuln" class="CMSBreadCrumbsLink">Vulnerabilities</a></li>
</ol>
</div>
<div>
<style>
/* wrap the words for CVSS v4 */
#nistv4Metric {
word-wrap: break-word;
}
</style>
<script>
/*<![CDATA[*/
var vuln = {
nistV4Present: false,
cnaV4Present: false,
nistV3Present: true,
cnaV3Present: false,
nistV2Present: true,
cnaV2Present: false
};
/*]]>*/
</script>
<div>
</div>
<div id="vulnDetailPanel">
<table id="vulnDetailTableView" style="border-collapse: collapse;">
<tr>
<td colspan="2">
<h2 data-testid="page-header">
<i class="fa fa-bug fa-flip-vertical"></i><span
data-testid="page-header-vuln-id">CVE-2022-29900</span>
Detail
</h2>
<div class="row">
<div class="col-lg-9 col-md-7 col-sm-12">
<div id="vulnShowWarningDiv"
data-testid="vuln-warning-container">
<div
role="alert" data-testid="vuln-warning-alert-container" class="bs-callout bs-callout-info">
<strong class="h4Size"><span
data-testid="vuln-warning-status-name">Modified</span></strong>
<hr/>
<p data-testid="vuln-warning-banner-content">This CVE record has been updated after NVD enrichment efforts were completed. Enrichment data supplied by the NVD may require amendment due to these changes.</p>
</div>
</div>
<h3 id="vulnDescriptionTitle"
data-testid="vuln-description-title">Current Description </h3>
<p data-testid="vuln-description">Mis-trained branch predictions for return instructions may allow arbitrary speculative code execution under certain microarchitecture-dependent conditions.</p><br/>
<p>
<a href="#vulnCurrentDescriptionTitle"
style="text-decoration: underline" id="showVulnAnalysis"><i
class="fa fa-plus"></i>View Analysis Description</a>
</p>
<div id="vulnAnalysisDescription" style="display: none;">
<h3 data-testid="vuln-analysis-description-title">Analysis
Description</h3>
<p data-testid="vuln-analysis-description">Mis-trained branch predictions for return instructions may allow arbitrary speculative code execution under certain microarchitecture-dependent conditions.</p>
</div>
<!-- CVSS Severity and Vector Strings -->
<div id="vulnCvssPanel" data-testid="vuln-cvss-container"
class="row bs-callout bs-callout-success cvssVulnDetail">
<h3 style="display: inline" title="CVSS is not a measure of risk">Metrics</h3>
&ensp;
<div id="cvssVulnDetailBtn" class="btn-group">
<button id="btn-cvss4" type="button" title="Click here to view CVSS 4.0 data"
class="btn default btn-lg cvssBtn">CVSS Version 4.0
</button>
<button id="btn-cvss3" type="button" title="Click here to view CVSS 3.x data"
class="btn default btn-lg cvssBtn">CVSS Version 3.x
</button>
<button id="btn-cvss2" type="button" title="Click here to view CVSS 2.0 data"
class="btn default btn-lg cvssBtn">CVSS Version 2.0
</button>
</div>
<div id="cvssEnrichmentNotes">
<i>
<small>
NVD enrichment efforts reference publicly available information to associate
vector strings. CVSS information contributed by other sources is also
displayed.
</small>
</i>
</div>
<!-- CVSS v4.0 -->
<div class="container-fluid" id="Vuln4CvssPanel" data-testid="vuln-cvss4-panel">
<strong>CVSS 4.0 Severity and Vector Strings:</strong>
<!-- NIST -->
<div class="row no-gutters">
<br/>
<div class="col-lg-3 col-sm-6">
<div class="row">
<div class="col-lg-3 col-sm-6">
<img
src="/site-media/images/NVD_NVD_Stack_Plain.svg"
class="cvssNvdIcon" alt="NIST CVSS score">
</div>
<div class="col-lg-9 col-sm-6">
<strong>NIST:</strong>&nbsp;<span class="wrapData"
data-testid="vuln-cvss4-source-nvd">NVD</span>
</div>
</div>
</div>
<div class="col-lg-3 col-sm-6">
<span><strong> </strong><span
class="severityDetail"> <a
id="Cvss4NistCalculatorAnchorNA"
class="label label-default"
data-testid="vuln-cvss4-panel-score-na">N/A</a></span></span>
</div>
<div class="col-lg-6 col-sm-12">
<span> <span
data-testid="vuln-cvss4-nist-vector-na">NVD assessment
not yet provided.</span></span> <input type="hidden"
id="nistV4MetricHidden"
value=""/>
</div>
</div>
<!-- CNA -->
<!-- ADP -->
</div>
<!-- CVSS V3.x -->
<div class="container-fluid" id="Vuln3CvssPanel" data-testid="vuln-cvss3-panel"
style="display: none;">
<strong>CVSS 3.x Severity and Vector Strings:</strong>
<!-- NIST -->
<div class="row no-gutters">
<br/>
<div class="col-lg-3 col-sm-6">
<div class="row">
<div class="col-lg-3 col-sm-6">
<img
src="/site-media/images/NVD_NVD_Stack_Plain.svg"
class="cvssNvdIcon" alt="NIST CVSS score">
</div>
<div class="col-lg-9 col-sm-6">
<strong>NIST:</strong>&nbsp;<span class="wrapData"
data-testid="vuln-cvss3-source-nvd">NVD</span>
</div>
</div>
</div>
<div class="col-lg-3 col-sm-6">
<span><strong>Base
Score:</strong>&nbsp;<span class="severityDetail"> <a
id="Cvss3NistCalculatorAnchor"
href="/vuln-metrics/cvss/v3-calculator?name=CVE-2022-29900&amp;vector=AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N&amp;version=3.1&amp;source=NIST"
data-testid="vuln-cvss3-panel-score"
class="label label-warning">6.5 MEDIUM</a>
</span></span>
</div>
<div class="col-lg-6 col-sm-12">
<span><strong>Vector:</strong>&nbsp;
<span data-testid="vuln-cvss3-nist-vector"
class="tooltipCvss3NistMetrics">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N</span></span>
<input type="hidden"
id="nistV3MetricHidden"
value="&lt;span id = &#39;nistV3Metric&#39; style = &#39;display:none&#39; &gt; &lt;strong style =&#39;font-size:1.2em&#39; &gt; CVSS v3.1 Severity and Metrics:&lt;/strong&gt; &lt;p data-testid=&#39;vuln-cvssv3-score-container&#39;&gt; &lt;strong&gt;Base Score: &lt;/strong&gt; &lt;span data-testid=&#39;vuln-cvssv3-base-score&#39;&gt;6.5 &lt;/span&gt;&lt;span data-testid=&#39;vuln-cvssv3-base-score-severity&#39;&gt;MEDIUM&lt;/span&gt; &lt;br /&gt; &lt;strong&gt;Vector: &lt;/strong&gt; &lt;span data-testid=&#39;vuln-cvssv3-vector&#39;&gt; AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N &lt;/span&gt; &lt;br /&gt; &lt;strong&gt;Impact Score: &lt;/strong&gt; &lt;span data-testid=&#39;vuln-cvssv3-impact-score&#39;&gt; 4.0 &lt;/span&gt; &lt;br /&gt; &lt;strong&gt;Exploitability Score: &lt;/strong&gt; &lt;span data-testid=&#39;vuln-cvssv3-exploitability-score&#39;&gt; 2.0 &lt;/span&gt; &lt;/p&gt; &lt;hr /&gt; &lt;p data-testid=&#39;vuln-cvssv3-metrics-container&#39;&gt; &lt;strong&gt;Attack Vector (AV): &lt;/strong&gt; &lt;span data-testid=&#39;vuln-cvssv3-av&#39;&gt; Local &lt;/span&gt; &lt;br /&gt; &lt;strong&gt;Attack Complexity (AC): &lt;/strong&gt; &lt;span data-testid=&#39;vuln-cvssv3-ac&#39;&gt; Low &lt;/span&gt; &lt;br /&gt; &lt;strong&gt;Privileges Required (PR): &lt;/strong&gt; &lt;span data-testid=&#39;vuln-cvssv3-pr&#39;&gt; Low &lt;/span&gt; &lt;br /&gt; &lt;strong&gt;User Interaction (UI): &lt;/strong&gt; &lt;span data-testid=&#39;vuln-cvssv3-ui&#39;&gt; None &lt;/span&gt; &lt;br /&gt; &lt;strong&gt;Scope (S): &lt;/strong&gt; &lt;span data-testid=&#39;vuln-cvssv3-s&#39;&gt; Changed &lt;/span&gt; &lt;br /&gt; &lt;strong&gt;Confidentiality (C): &lt;/strong&gt; &lt;span data-testid=&#39;vuln-cvssv3-c&#39;&gt; High &lt;/span&gt; &lt;br /&gt; &lt;strong&gt;Integrity (I): &lt;/strong&gt; &lt;span data-testid=&#39;vuln-cvssv3-i&#39;&gt; None &lt;/span&gt; &lt;br /&gt; &lt;strong&gt;Availability (A): &lt;/strong&gt; &lt;span data-testid=&#39;vuln-cvssv3-a&#39;&gt; None &lt;/span&gt; &lt;/p&gt; &lt;/span&gt; "/>
</div>
</div>
<!-- CNA -->
<!-- ADP -->
<!-- <div id="cvss3FootNote" class="cvssFootNote" >-->
<!-- <br/><br/>-->
<!-- <span id = "cvss3FootNoteSection" th:utext="${cvssData.cvss3FootNoteHtml}"></span>-->
<!-- </div>-->
</div>
<!-- CVSS V2.0 -->
<div class="container-fluid" id="Vuln2CvssPanel" data-testid="vuln-cvss2-panel"
style="display: none;">
<strong>CVSS 2.0 Severity and Vector Strings:</strong> <br/> <br/>
<!-- NIST -->
<div class="row no-gutters">
<div class="col-lg-3 col-sm-6">
<div class="row">
<div class="col-lg-3 col-sm-6">
<img
src="/site-media/images/NVD_NVD_Stack_Plain.svg"
class="cvssNvdIcon"
alt="National Institute of Standards and Technology">
</div>
<div class="col-lg-9 col-sm-6">
<strong>NIST:</strong>&nbsp;<span
data-testid="vuln-cvss2-source-nvd">NVD</span>
</div>
</div>
</div>
<div class="col-lg-3 col-sm-6">
<span><strong>Base
Score:</strong>&nbsp;<span class="severityDetail"> <a
id="Cvss2CalculatorAnchor"
href="/vuln-metrics/cvss/v2-calculator?name=CVE-2022-29900&amp;vector=(AV:L/AC:L/Au:N/C:P/I:N/A:N)&amp;version=2.0&amp;source=NIST" class="label label-low">2.1 LOW</a></span></span>
</div>
<div class="col-lg-6 col-sm-12">
<span><strong>Vector:</strong>&nbsp;
<span data-testid="vuln-cvss2-panel-vector"
class="tooltipCvss2NistMetrics">(AV:L/AC:L/Au:N/C:P/I:N/A:N)</span></span> <input type="hidden"
id="nistV2MetricHidden"
value="&lt;span id =&#39;cnaV2Metric&#39; style=&#39;display:none&#39;&gt;&lt;strong style=&#39;font-size:1.2em&#39; &gt;CVSS v2.0 Severity and Metrics:&lt;/strong&gt;&lt;p data-testid=&#39;vuln-cvssv2-score-container&#39;&gt;&lt;strong&gt;Base Score: &lt;/strong&gt;&lt;span data-testid=&#39;vuln-cvssv2-base-score&#39;&gt;2.1 &lt;/span&gt;&lt;span data-testid=&#39;vuln-cvssv2-base-score-severity&#39;&gt;LOW&lt;/span&gt;&lt;br /&gt;&lt;strong&gt;Vector: &lt;/strong&gt;&lt;span data-testid=&#39;vuln-cvssv2-vector&#39;&gt;(AV:L/AC:L/Au:N/C:P/I:N/A:N)&lt;/span&gt;&lt;br /&gt;&lt;strong&gt;Impact Subscore: &lt;/strong&gt;&lt;span data-testid=&#39;vuln-cvssv2-impact-subscore&#39;&gt;2.9&lt;/span&gt;&lt;br /&gt;&lt;strong&gt;Exploitability Subscore: &lt;/strong&gt;&lt;span data-testid=&#39;vuln-cvssv2-exploitability-score&#39;&gt;3.9&lt;/span&gt;&lt;/p&gt;&lt;hr /&gt;&lt;p data-testid=&#39;vuln-cvssv2-metrics-container&#39;&gt;&lt;strong&gt;Access Vector (AV): &lt;/strong&gt;&lt;span data-testid=&#39;vuln-cvssv2-av&#39;&gt;Local&lt;/span&gt;&lt;br /&gt;&lt;strong&gt;Access Complexity (AC): &lt;/strong&gt;&lt;span data-testid=&#39;vuln-cvssv2-ac&#39;&gt;Low&lt;/span&gt;&lt;br /&gt;&lt;strong&gt;Authentication (AU): &lt;/strong&gt;&lt;span data-testid=&#39;vuln-cvssv2-au&#39;&gt;None&lt;/span&gt;&lt;br /&gt;&lt;strong&gt;Confidentiality (C): &lt;/strong&gt;&lt;span data-testid=&#39;vuln-cvssv3-c&#39;&gt;Partial&lt;/span&gt;&lt;br /&gt;&lt;strong&gt;Integrity (I): &lt;/strong&gt;&lt;span data-testid=&#39;vuln-cvssv2-i&#39;&gt;None&lt;/span&gt;&lt;br /&gt;&lt;strong&gt;Availability (A): &lt;/strong&gt;&lt;span data-testid=&#39;vuln-cvssv2-a&#39;&gt;None&lt;/span&gt;&lt;br /&gt;&lt;strong&gt;Additional Information: &lt;/strong&gt;&lt;br/&gt;&lt;span data-testid=&#39;vuln-cvssv2-additional&#39;&gt;Allows unauthorized disclosure of information&lt;br/&gt;&lt;/span&gt;&lt;/p&gt;&lt;/span&gt;"/>
</div>
</div>
<!-- CNA -->
<!-- ADP -->
<!-- <div id = "cvss2FootNote" class="cvssFootNote" >-->
<!-- <br/><br/>-->
<!-- <span id = "cvss2FootNoteSection" th:utext="${cvssData.cvss2FootNoteHtml}"></span>-->
<!-- </div>-->
</div>
</div>
<div class="row col-sm-12">
<div id="vulnHyperlinksPanel">
<h3>References to Advisories, Solutions, and Tools</h3>
<p>
By selecting these links, you will be leaving NIST webspace.
We have provided these links to other web sites because they
may have information that would be of interest to you. No
inferences should be drawn on account of other sites being
referenced, or not, from this page. There may be other web
sites that are more appropriate for your purpose. NIST does
not necessarily endorse the views expressed, or concur with
the facts presented on these sites. Further, NIST does not
endorse any commercial products that may be mentioned on
these sites. Please address comments about this page to <a
href="mailto:nvd@nist.gov">nvd@nist.gov</a>.
</p>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-hyperlinks-table">
<thead>
<tr>
<th>Hyperlink</th>
<th>Resource</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-hyperlinks-row-0">
<td data-testid="vuln-hyperlinks-link-0">
<a
href="https://lists.debian.org/debian-lts-announce/2022/09/msg00011.html"
target="_blank" rel="noopener noreferrer">https://lists.debian.org/debian-lts-announce/2022/09/msg00011.html</a></td>
<td data-testid="vuln-hyperlinks-resType-0">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-1">
<td data-testid="vuln-hyperlinks-link-1">
<a
href="https://lists.debian.org/debian-lts-announce/2022/09/msg00011.html"
target="_blank" rel="noopener noreferrer">https://lists.debian.org/debian-lts-announce/2022/09/msg00011.html</a></td>
<td data-testid="vuln-hyperlinks-resType-1">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-2">
<td data-testid="vuln-hyperlinks-link-2">
<a
href="https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYI3OMJ7RIZNL3C6GUWNANNPEUUID6FM/"
target="_blank" rel="noopener noreferrer">https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYI3OMJ7RIZNL3C6GUWNANNPEUUID6FM/</a></td>
<td data-testid="vuln-hyperlinks-resType-2">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-3">
<td data-testid="vuln-hyperlinks-link-3">
<a
href="https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYI3OMJ7RIZNL3C6GUWNANNPEUUID6FM/"
target="_blank" rel="noopener noreferrer">https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYI3OMJ7RIZNL3C6GUWNANNPEUUID6FM/</a></td>
<td data-testid="vuln-hyperlinks-resType-3">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-4">
<td data-testid="vuln-hyperlinks-link-4">
<a
href="https://security.gentoo.org/glsa/202402-07"
target="_blank" rel="noopener noreferrer">https://security.gentoo.org/glsa/202402-07</a></td>
<td data-testid="vuln-hyperlinks-resType-4">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-5">
<td data-testid="vuln-hyperlinks-link-5">
<a
href="https://security.gentoo.org/glsa/202402-07"
target="_blank" rel="noopener noreferrer">https://security.gentoo.org/glsa/202402-07</a></td>
<td data-testid="vuln-hyperlinks-resType-5">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-6">
<td data-testid="vuln-hyperlinks-link-6">
<a
href="https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1037"
target="_blank" rel="noopener noreferrer">https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1037</a></td>
<td data-testid="vuln-hyperlinks-resType-6">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-7">
<td data-testid="vuln-hyperlinks-link-7">
<a
href="https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1037"
target="_blank" rel="noopener noreferrer">https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1037</a></td>
<td data-testid="vuln-hyperlinks-resType-7">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-8">
<td data-testid="vuln-hyperlinks-link-8">
<a
href="https://www.debian.org/security/2022/dsa-5207"
target="_blank" rel="noopener noreferrer">https://www.debian.org/security/2022/dsa-5207</a></td>
<td data-testid="vuln-hyperlinks-resType-8">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-9">
<td data-testid="vuln-hyperlinks-link-9">
<a
href="https://www.debian.org/security/2022/dsa-5207"
target="_blank" rel="noopener noreferrer">https://www.debian.org/security/2022/dsa-5207</a></td>
<td data-testid="vuln-hyperlinks-resType-9">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-10">
<td data-testid="vuln-hyperlinks-link-10">
<a
href="https://www.secpod.com/blog/retbleed-intel-and-amd-processor-information-disclosure-vulnerability/"
target="_blank" rel="noopener noreferrer">https://www.secpod.com/blog/retbleed-intel-and-amd-processor-information-disclosure-vulnerability/</a></td>
<td data-testid="vuln-hyperlinks-resType-10">
</td>
</tr>
<tr data-testid="vuln-hyperlinks-row-11">
<td data-testid="vuln-hyperlinks-link-11">
<a
href="https://www.secpod.com/blog/retbleed-intel-and-amd-processor-information-disclosure-vulnerability/"
target="_blank" rel="noopener noreferrer">https://www.secpod.com/blog/retbleed-intel-and-amd-processor-information-disclosure-vulnerability/</a></td>
<td data-testid="vuln-hyperlinks-resType-11">
</td>
</tr>
</tbody>
</table>
</div>
<div id="vulnTechnicalDetailsDiv" class="technicalDetails"
data-testid="vuln-technical-details-container">
<h3>Weakness Enumeration</h3>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-CWEs-table">
<thead>
<tr>
<th>CWE-ID</th>
<th>CWE Name</th>
<th>Source</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-CWEs-row-0">
<td data-testid="vuln-CWEs-link-0">
<a href="http://cwe.mitre.org/data/definitions/212.html" target="_blank" rel="noopener noreferrer">CWE-212</a>
</td>
<td
data-testid="vuln-CWEs-link-0">Improper Removal of Sensitive Information Before Storage or Transfer</td>
<td data-testid="vuln-cwes-assigner-0">
<span class="cweSource" data-testid="vuln-cwes-assigner-0-0"
>
<img src="/site-media/images/NVD_NVD_Stack_Plain.svg"
class="cweNvdIcon"
alt="cwe source acceptance level">
<span>NIST</span>
</span>
</td>
</tr>
</tbody>
</table>
</div>
<div>
<h3>
Known Affected Software Configurations <small> <a
id="toggleCpeVersion" href="#vulnConfigurationsArea">Switch
to CPE 2.2</a></small>
</h3>
<span id="vulnConfigurationsArea"></span>
<input type="hidden" id="cveIdHidden" value="CVE-2022-29900"/>
<div>
<div id="vulnCpeTreeLoading"><h3>CPEs loading, please wait.</h3></div>
<div id="vulnCpeTree" style="display: none;"></div>
<input type="hidden"
id="InputRestBasePath"
value="/rest/public">
<input type="hidden" id="cveTreeJsonDataHidden" value="[{&quot;id&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-config-1&quot;,&quot;totalCpeCount&quot;:4,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-1-0&quot;,&quot;configType&quot;:&quot;BASIC&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Adebian%3Adebian_linux%3A11.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:debian:debian_linux:11.0&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-0&quot;,&quot;id&quot;:&quot;15584779&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Afedoraproject%3Afedora%3A35%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:fedoraproject:fedora:35&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-1&quot;,&quot;id&quot;:&quot;15584780&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Afedoraproject%3Afedora%3A36%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:fedoraproject:fedora:36&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-2&quot;,&quot;id&quot;:&quot;15584781&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]},{&quot;depth&quot;:2,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Axen%3Axen%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:xen:xen:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:xen:xen:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-1-0-3&quot;,&quot;id&quot;:&quot;15584778&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]},{&quot;id&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-config-2&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-2-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-2-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aathlon_x4_750_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:athlon_x4_750_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:athlon_x4_750_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-0-0&quot;,&quot;id&quot;:&quot;15584782&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-2-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aathlon_x4_750%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:athlon_x4_750:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:athlon_x4_750:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-2-0-1-0&quot;,&quot;id&quot;:&quot;15584783&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:3,&quot;dataTestId&quot;:&quot;vuln-software-config-3&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-3-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-3-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aathlon_x4_760k_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:athlon_x4_760k_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:athlon_x4_760k_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-3-0-0-0&quot;,&quot;id&quot;:&quot;15584784&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-3-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aathlon_x4_760k%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:athlon_x4_760k:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:athlon_x4_760k:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-3-0-1-0&quot;,&quot;id&quot;:&quot;15584785&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:4,&quot;dataTestId&quot;:&quot;vuln-software-config-4&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-4-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-4-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aathlon_x4_830_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:athlon_x4_830_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:athlon_x4_830_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-4-0-0-0&quot;,&quot;id&quot;:&quot;15584786&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-4-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aathlon_x4_830%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:athlon_x4_830:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:athlon_x4_830:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-4-0-1-0&quot;,&quot;id&quot;:&quot;15584787&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:5,&quot;dataTestId&quot;:&quot;vuln-software-config-5&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-5-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-5-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aathlon_x4_835_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:athlon_x4_835_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:athlon_x4_835_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-5-0-0-0&quot;,&quot;id&quot;:&quot;15584788&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-5-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aathlon_x4_835%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:athlon_x4_835:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:athlon_x4_835:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-5-0-1-0&quot;,&quot;id&quot;:&quot;15584789&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:6,&quot;dataTestId&quot;:&quot;vuln-software-config-6&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-6-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-6-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aathlon_x4_840_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:athlon_x4_840_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:athlon_x4_840_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-6-0-0-0&quot;,&quot;id&quot;:&quot;15584790&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-6-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aathlon_x4_840%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:athlon_x4_840:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:athlon_x4_840:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-6-0-1-0&quot;,&quot;id&quot;:&quot;15584791&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:7,&quot;dataTestId&quot;:&quot;vuln-software-config-7&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-7-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-7-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aathlon_x4_845_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:athlon_x4_845_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:athlon_x4_845_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-7-0-0-0&quot;,&quot;id&quot;:&quot;15584792&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-7-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aathlon_x4_845%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:athlon_x4_845:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:athlon_x4_845:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-7-0-1-0&quot;,&quot;id&quot;:&quot;15584793&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:8,&quot;dataTestId&quot;:&quot;vuln-software-config-8&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-8-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-8-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aathlon_x4_860k_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:athlon_x4_860k_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:athlon_x4_860k_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-8-0-0-0&quot;,&quot;id&quot;:&quot;15584794&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-8-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aathlon_x4_860k%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:athlon_x4_860k:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:athlon_x4_860k:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-8-0-1-0&quot;,&quot;id&quot;:&quot;15584795&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:9,&quot;dataTestId&quot;:&quot;vuln-software-config-9&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-9-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-9-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aathlon_x4_870k_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:athlon_x4_870k_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:athlon_x4_870k_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-0-0&quot;,&quot;id&quot;:&quot;15584796&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-9-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aathlon_x4_870k%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:athlon_x4_870k:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:athlon_x4_870k:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-9-0-1-0&quot;,&quot;id&quot;:&quot;15584797&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:10,&quot;dataTestId&quot;:&quot;vuln-software-config-10&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-10-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-10-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aathlon_x4_880k_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:athlon_x4_880k_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:athlon_x4_880k_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-10-0-0-0&quot;,&quot;id&quot;:&quot;15584798&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-10-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aathlon_x4_880k%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:athlon_x4_880k:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:athlon_x4_880k:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-10-0-1-0&quot;,&quot;id&quot;:&quot;15584799&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:11,&quot;dataTestId&quot;:&quot;vuln-software-config-11&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-11-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-11-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aathlon_x4_940_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:athlon_x4_940_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:athlon_x4_940_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-0-0&quot;,&quot;id&quot;:&quot;15584800&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-11-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aathlon_x4_940%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:athlon_x4_940:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:athlon_x4_940:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-11-0-1-0&quot;,&quot;id&quot;:&quot;15584801&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:12,&quot;dataTestId&quot;:&quot;vuln-software-config-12&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-12-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-12-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aathlon_x4_950_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:athlon_x4_950_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:athlon_x4_950_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-12-0-0-0&quot;,&quot;id&quot;:&quot;15584802&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-12-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aathlon_x4_950%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:athlon_x4_950:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:athlon_x4_950:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-12-0-1-0&quot;,&quot;id&quot;:&quot;15584803&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:13,&quot;dataTestId&quot;:&quot;vuln-software-config-13&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-13-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-13-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aathlon_x4_970_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:athlon_x4_970_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:athlon_x4_970_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-13-0-0-0&quot;,&quot;id&quot;:&quot;15584804&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-13-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aathlon_x4_970%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:athlon_x4_970:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:athlon_x4_970:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-13-0-1-0&quot;,&quot;id&quot;:&quot;15584805&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:14,&quot;dataTestId&quot;:&quot;vuln-software-config-14&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-14-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-14-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aryzen_threadripper_pro_3995wx_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:ryzen_threadripper_pro_3995wx_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:ryzen_threadripper_pro_3995wx_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-14-0-0-0&quot;,&quot;id&quot;:&quot;15584806&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-14-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aryzen_threadripper_pro_3995wx%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:ryzen_threadripper_pro_3995wx:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:ryzen_threadripper_pro_3995wx:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-14-0-1-0&quot;,&quot;id&quot;:&quot;15584807&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:15,&quot;dataTestId&quot;:&quot;vuln-software-config-15&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-15-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-15-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aryzen_threadripper_pro_3795wx_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:ryzen_threadripper_pro_3795wx_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:ryzen_threadripper_pro_3795wx_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-15-0-0-0&quot;,&quot;id&quot;:&quot;15584808&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-15-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aryzen_threadripper_pro_3795wx%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:ryzen_threadripper_pro_3795wx:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:ryzen_threadripper_pro_3795wx:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-15-0-1-0&quot;,&quot;id&quot;:&quot;15584809&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:16,&quot;dataTestId&quot;:&quot;vuln-software-config-16&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-16-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-16-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aryzen_threadripper_pro_3955wx_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:ryzen_threadripper_pro_3955wx_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:ryzen_threadripper_pro_3955wx_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-16-0-0-0&quot;,&quot;id&quot;:&quot;15584810&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-16-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aryzen_threadripper_pro_3955wx%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:ryzen_threadripper_pro_3955wx:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:ryzen_threadripper_pro_3955wx:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-16-0-1-0&quot;,&quot;id&quot;:&quot;15584811&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:17,&quot;dataTestId&quot;:&quot;vuln-software-config-17&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-17-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-17-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aryzen_threadripper_pro_3945wx%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:ryzen_threadripper_pro_3945wx:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:ryzen_threadripper_pro_3945wx:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-17-0-0-0&quot;,&quot;id&quot;:&quot;15584848&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-17-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aryzen_threadripper_pro_3945wx_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:ryzen_threadripper_pro_3945wx_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:ryzen_threadripper_pro_3945wx_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-17-0-1-0&quot;,&quot;id&quot;:&quot;15584849&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:18,&quot;dataTestId&quot;:&quot;vuln-software-config-18&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-18-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-18-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aryzen_threadripper_pro_5955wx%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:ryzen_threadripper_pro_5955wx:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:ryzen_threadripper_pro_5955wx:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-18-0-0-0&quot;,&quot;id&quot;:&quot;15584846&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-18-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aryzen_threadripper_pro_5955wx_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:ryzen_threadripper_pro_5955wx_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:ryzen_threadripper_pro_5955wx_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-18-0-1-0&quot;,&quot;id&quot;:&quot;15584847&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:19,&quot;dataTestId&quot;:&quot;vuln-software-config-19&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-19-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-19-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aryzen_threadripper_pro_5965wx%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:ryzen_threadripper_pro_5965wx:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:ryzen_threadripper_pro_5965wx:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-19-0-0-0&quot;,&quot;id&quot;:&quot;15584844&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-19-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aryzen_threadripper_pro_5965wx_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:ryzen_threadripper_pro_5965wx_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:ryzen_threadripper_pro_5965wx_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-19-0-1-0&quot;,&quot;id&quot;:&quot;15584845&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:20,&quot;dataTestId&quot;:&quot;vuln-software-config-20&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-20-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-20-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aryzen_threadripper_pro_5945wx%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:ryzen_threadripper_pro_5945wx:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:ryzen_threadripper_pro_5945wx:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-20-0-0-0&quot;,&quot;id&quot;:&quot;15584842&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-20-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aryzen_threadripper_pro_5945wx_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:ryzen_threadripper_pro_5945wx_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:ryzen_threadripper_pro_5945wx_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-20-0-1-0&quot;,&quot;id&quot;:&quot;15584843&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:21,&quot;dataTestId&quot;:&quot;vuln-software-config-21&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-21-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-21-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aryzen_threadripper_pro_5975wx%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:ryzen_threadripper_pro_5975wx:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:ryzen_threadripper_pro_5975wx:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-21-0-0-0&quot;,&quot;id&quot;:&quot;15584840&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-21-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aryzen_threadripper_pro_5975wx_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:ryzen_threadripper_pro_5975wx_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:ryzen_threadripper_pro_5975wx_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-21-0-1-0&quot;,&quot;id&quot;:&quot;15584841&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:22,&quot;dataTestId&quot;:&quot;vuln-software-config-22&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-22-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-22-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aryzen_threadripper_pro_5995wx%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:ryzen_threadripper_pro_5995wx:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:ryzen_threadripper_pro_5995wx:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-22-0-0-0&quot;,&quot;id&quot;:&quot;15584838&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-22-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aryzen_threadripper_pro_5995wx_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:ryzen_threadripper_pro_5995wx_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:ryzen_threadripper_pro_5995wx_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-22-0-1-0&quot;,&quot;id&quot;:&quot;15584839&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:23,&quot;dataTestId&quot;:&quot;vuln-software-config-23&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-23-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-23-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aryzen_threadripper_2990wx%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:ryzen_threadripper_2990wx:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:ryzen_threadripper_2990wx:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-23-0-0-0&quot;,&quot;id&quot;:&quot;15584836&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-23-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aryzen_threadripper_2990wx_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:ryzen_threadripper_2990wx_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:ryzen_threadripper_2990wx_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-23-0-1-0&quot;,&quot;id&quot;:&quot;15584837&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:24,&quot;dataTestId&quot;:&quot;vuln-software-config-24&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-24-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-24-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aryzen_threadripper_2970wx%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:ryzen_threadripper_2970wx:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:ryzen_threadripper_2970wx:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-24-0-0-0&quot;,&quot;id&quot;:&quot;15584834&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-24-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aryzen_threadripper_2970wx_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:ryzen_threadripper_2970wx_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:ryzen_threadripper_2970wx_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-24-0-1-0&quot;,&quot;id&quot;:&quot;15584835&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:25,&quot;dataTestId&quot;:&quot;vuln-software-config-25&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-25-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-25-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aryzen_threadripper_2950x_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:ryzen_threadripper_2950x_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:ryzen_threadripper_2950x_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-25-0-0-0&quot;,&quot;id&quot;:&quot;15584812&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-25-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aryzen_threadripper_2950x%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:ryzen_threadripper_2950x:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:ryzen_threadripper_2950x:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-25-0-1-0&quot;,&quot;id&quot;:&quot;15584813&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:26,&quot;dataTestId&quot;:&quot;vuln-software-config-26&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-26-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-26-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aryzen_threadripper_2920x_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:ryzen_threadripper_2920x_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:ryzen_threadripper_2920x_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-26-0-0-0&quot;,&quot;id&quot;:&quot;15584814&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-26-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aryzen_threadripper_2920x%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:ryzen_threadripper_2920x:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:ryzen_threadripper_2920x:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-26-0-1-0&quot;,&quot;id&quot;:&quot;15584815&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:27,&quot;dataTestId&quot;:&quot;vuln-software-config-27&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-27-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-27-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aryzen_threadripper_3990x_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:ryzen_threadripper_3990x_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:ryzen_threadripper_3990x_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-27-0-0-0&quot;,&quot;id&quot;:&quot;15584816&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-27-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aryzen_threadripper_3990x%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:ryzen_threadripper_3990x:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:ryzen_threadripper_3990x:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-27-0-1-0&quot;,&quot;id&quot;:&quot;15584817&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:28,&quot;dataTestId&quot;:&quot;vuln-software-config-28&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-28-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-28-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aryzen_threadripper_3970x_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:ryzen_threadripper_3970x_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:ryzen_threadripper_3970x_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-28-0-0-0&quot;,&quot;id&quot;:&quot;15584818&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-28-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aryzen_threadripper_3970x%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:ryzen_threadripper_3970x:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:ryzen_threadripper_3970x:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-28-0-1-0&quot;,&quot;id&quot;:&quot;15584819&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:29,&quot;dataTestId&quot;:&quot;vuln-software-config-29&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-29-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-29-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aryzen_threadripper_3960x_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:ryzen_threadripper_3960x_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:ryzen_threadripper_3960x_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-29-0-0-0&quot;,&quot;id&quot;:&quot;15584820&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-29-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aryzen_threadripper_3960x%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:ryzen_threadripper_3960x:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:ryzen_threadripper_3960x:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-29-0-1-0&quot;,&quot;id&quot;:&quot;15584821&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:30,&quot;dataTestId&quot;:&quot;vuln-software-config-30&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-30-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-30-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aa12-9700p_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:a12-9700p_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:a12-9700p_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-30-0-0-0&quot;,&quot;id&quot;:&quot;15584822&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-30-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aa12-9700p%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:a12-9700p:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:a12-9700p:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-30-0-1-0&quot;,&quot;id&quot;:&quot;15584823&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:31,&quot;dataTestId&quot;:&quot;vuln-software-config-31&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-31-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-31-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aa12-9730p_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:a12-9730p_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:a12-9730p_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-31-0-0-0&quot;,&quot;id&quot;:&quot;15584824&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-31-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aa12-9730p%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:a12-9730p:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:a12-9730p:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-31-0-1-0&quot;,&quot;id&quot;:&quot;15584825&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:32,&quot;dataTestId&quot;:&quot;vuln-software-config-32&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-32-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-32-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aa10-9600p_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:a10-9600p_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:a10-9600p_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-32-0-0-0&quot;,&quot;id&quot;:&quot;15584826&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-32-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aa10-9600p%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:a10-9600p:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:a10-9600p:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-32-0-1-0&quot;,&quot;id&quot;:&quot;15584827&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:33,&quot;dataTestId&quot;:&quot;vuln-software-config-33&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-33-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-33-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aa10-9630p_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:a10-9630p_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:a10-9630p_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-33-0-0-0&quot;,&quot;id&quot;:&quot;15584828&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-33-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aa10-9630p%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:a10-9630p:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:a10-9630p:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-33-0-1-0&quot;,&quot;id&quot;:&quot;15584829&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:34,&quot;dataTestId&quot;:&quot;vuln-software-config-34&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-34-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-34-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aa9-9410_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:a9-9410_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:a9-9410_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-34-0-0-0&quot;,&quot;id&quot;:&quot;15584830&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-34-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aa9-9410%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:a9-9410:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:a9-9410:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-34-0-1-0&quot;,&quot;id&quot;:&quot;15584831&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:35,&quot;dataTestId&quot;:&quot;vuln-software-config-35&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-35-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-35-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aa9-9420_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:a9-9420_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:a9-9420_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-35-0-0-0&quot;,&quot;id&quot;:&quot;15584832&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-35-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aa9-9420%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:a9-9420:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:a9-9420:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-35-0-1-0&quot;,&quot;id&quot;:&quot;15584833&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:36,&quot;dataTestId&quot;:&quot;vuln-software-config-36&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-36-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-36-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aa6-9210_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:a6-9210_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:a6-9210_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-36-0-0-0&quot;,&quot;id&quot;:&quot;15584850&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-36-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aa6-9210%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:a6-9210:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:a6-9210:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-36-0-1-0&quot;,&quot;id&quot;:&quot;15584851&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:37,&quot;dataTestId&quot;:&quot;vuln-software-config-37&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-37-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-37-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aa6-9220_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:a6-9220_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:a6-9220_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-37-0-0-0&quot;,&quot;id&quot;:&quot;15584852&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-37-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aa6-9220%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:a6-9220:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:a6-9220:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-37-0-1-0&quot;,&quot;id&quot;:&quot;15584853&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:38,&quot;dataTestId&quot;:&quot;vuln-software-config-38&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-38-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-38-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aa6-9220c_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:a6-9220c_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:a6-9220c_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-38-0-0-0&quot;,&quot;id&quot;:&quot;15584854&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-38-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aa6-9220c%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:a6-9220c:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:a6-9220c:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-38-0-1-0&quot;,&quot;id&quot;:&quot;15584855&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:39,&quot;dataTestId&quot;:&quot;vuln-software-config-39&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-39-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-39-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aa4-9120_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:a4-9120_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:a4-9120_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-39-0-0-0&quot;,&quot;id&quot;:&quot;15584856&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-39-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aa4-9120%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:a4-9120:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:a4-9120:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-39-0-1-0&quot;,&quot;id&quot;:&quot;15584857&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:40,&quot;dataTestId&quot;:&quot;vuln-software-config-40&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-40-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-40-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aryzen_3_2200u_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:ryzen_3_2200u_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:ryzen_3_2200u_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-40-0-0-0&quot;,&quot;id&quot;:&quot;15584858&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-40-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aryzen_3_2200u%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:ryzen_3_2200u:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:ryzen_3_2200u:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-40-0-1-0&quot;,&quot;id&quot;:&quot;15584859&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:41,&quot;dataTestId&quot;:&quot;vuln-software-config-41&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-41-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-41-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aryzen_3_2300u_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:ryzen_3_2300u_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:ryzen_3_2300u_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-41-0-0-0&quot;,&quot;id&quot;:&quot;15584860&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-41-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aryzen_3_2300u%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:ryzen_3_2300u:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:ryzen_3_2300u:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-41-0-1-0&quot;,&quot;id&quot;:&quot;15584861&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:42,&quot;dataTestId&quot;:&quot;vuln-software-config-42&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-42-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-42-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aryzen_5_2500u_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:ryzen_5_2500u_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:ryzen_5_2500u_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-42-0-0-0&quot;,&quot;id&quot;:&quot;15584862&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-42-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aryzen_5_2500u%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:ryzen_5_2500u:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:ryzen_5_2500u:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-42-0-1-0&quot;,&quot;id&quot;:&quot;15584863&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:43,&quot;dataTestId&quot;:&quot;vuln-software-config-43&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-43-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-43-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aryzen_5_2600_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:ryzen_5_2600_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:ryzen_5_2600_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-43-0-0-0&quot;,&quot;id&quot;:&quot;15584864&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-43-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aryzen_5_2600%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:ryzen_5_2600:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:ryzen_5_2600:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-43-0-1-0&quot;,&quot;id&quot;:&quot;15584865&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:44,&quot;dataTestId&quot;:&quot;vuln-software-config-44&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-44-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-44-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aryzen_5_2600h_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:ryzen_5_2600h_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:ryzen_5_2600h_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-44-0-0-0&quot;,&quot;id&quot;:&quot;15584866&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-44-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aryzen_5_2600h%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:ryzen_5_2600h:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:ryzen_5_2600h:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-44-0-1-0&quot;,&quot;id&quot;:&quot;15584867&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:45,&quot;dataTestId&quot;:&quot;vuln-software-config-45&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-45-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-45-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aryzen_5_2600x_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:ryzen_5_2600x_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:ryzen_5_2600x_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-45-0-0-0&quot;,&quot;id&quot;:&quot;15584868&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-45-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aryzen_5_2600x%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:ryzen_5_2600x:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:ryzen_5_2600x:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-45-0-1-0&quot;,&quot;id&quot;:&quot;15584869&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:46,&quot;dataTestId&quot;:&quot;vuln-software-config-46&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-46-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-46-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aryzen_5_2700_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:ryzen_5_2700_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:ryzen_5_2700_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-46-0-0-0&quot;,&quot;id&quot;:&quot;15584870&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-46-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aryzen_5_2700%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:ryzen_5_2700:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:ryzen_5_2700:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-46-0-1-0&quot;,&quot;id&quot;:&quot;15584871&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:47,&quot;dataTestId&quot;:&quot;vuln-software-config-47&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-47-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-47-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aryzen_5_2700x_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:ryzen_5_2700x_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:ryzen_5_2700x_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-47-0-0-0&quot;,&quot;id&quot;:&quot;15584872&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-47-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aryzen_5_2700x%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:ryzen_5_2700x:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:ryzen_5_2700x:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-47-0-1-0&quot;,&quot;id&quot;:&quot;15584873&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:48,&quot;dataTestId&quot;:&quot;vuln-software-config-48&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-48-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-48-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aryzen_7_2700_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:ryzen_7_2700_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:ryzen_7_2700_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-48-0-0-0&quot;,&quot;id&quot;:&quot;15584874&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-48-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aryzen_7_2700%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:ryzen_7_2700:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:ryzen_7_2700:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-48-0-1-0&quot;,&quot;id&quot;:&quot;15584875&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:49,&quot;dataTestId&quot;:&quot;vuln-software-config-49&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-49-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-49-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aryzen_7_2700u_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:ryzen_7_2700u_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:ryzen_7_2700u_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-49-0-0-0&quot;,&quot;id&quot;:&quot;15584876&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-49-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aryzen_7_2700u%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:ryzen_7_2700u:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:ryzen_7_2700u:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-49-0-1-0&quot;,&quot;id&quot;:&quot;15584877&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:50,&quot;dataTestId&quot;:&quot;vuln-software-config-50&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-50-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-50-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aryzen_7_2700x_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:ryzen_7_2700x_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:ryzen_7_2700x_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-50-0-0-0&quot;,&quot;id&quot;:&quot;15584878&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-50-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aryzen_7_2700x%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:ryzen_7_2700x:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:ryzen_7_2700x:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-50-0-1-0&quot;,&quot;id&quot;:&quot;15584879&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:51,&quot;dataTestId&quot;:&quot;vuln-software-config-51&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-51-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-51-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aryzen_7_2800h_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:ryzen_7_2800h_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:ryzen_7_2800h_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-51-0-0-0&quot;,&quot;id&quot;:&quot;15584880&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-51-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aryzen_7_2800h%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:ryzen_7_2800h:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:ryzen_7_2800h:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-51-0-1-0&quot;,&quot;id&quot;:&quot;15584881&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:52,&quot;dataTestId&quot;:&quot;vuln-software-config-52&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-52-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-52-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aryzen_3_3100%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:ryzen_3_3100:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:ryzen_3_3100:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-52-0-0-0&quot;,&quot;id&quot;:&quot;15584918&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-52-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aryzen_3_3100_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:ryzen_3_3100_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:ryzen_3_3100_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-52-0-1-0&quot;,&quot;id&quot;:&quot;15584919&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:53,&quot;dataTestId&quot;:&quot;vuln-software-config-53&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-53-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-53-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aryzen_3_3200u_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:ryzen_3_3200u_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:ryzen_3_3200u_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-53-0-0-0&quot;,&quot;id&quot;:&quot;15584916&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-53-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aryzen_3_3200u%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:ryzen_3_3200u:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:ryzen_3_3200u:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-53-0-1-0&quot;,&quot;id&quot;:&quot;15584917&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:54,&quot;dataTestId&quot;:&quot;vuln-software-config-54&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-54-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-54-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aryzen_3_3250u_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:ryzen_3_3250u_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:ryzen_3_3250u_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-54-0-0-0&quot;,&quot;id&quot;:&quot;15584914&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-54-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aryzen_3_3250u%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:ryzen_3_3250u:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:ryzen_3_3250u:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-54-0-1-0&quot;,&quot;id&quot;:&quot;15584915&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:55,&quot;dataTestId&quot;:&quot;vuln-software-config-55&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-55-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-55-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aryzen_3_3300g_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:ryzen_3_3300g_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:ryzen_3_3300g_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-55-0-0-0&quot;,&quot;id&quot;:&quot;15584912&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-55-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aryzen_3_3300g%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:ryzen_3_3300g:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:ryzen_3_3300g:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-55-0-1-0&quot;,&quot;id&quot;:&quot;15584913&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:56,&quot;dataTestId&quot;:&quot;vuln-software-config-56&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-56-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-56-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aryzen_3_3300u_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:ryzen_3_3300u_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:ryzen_3_3300u_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-56-0-0-0&quot;,&quot;id&quot;:&quot;15584910&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-56-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aryzen_3_3300u%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:ryzen_3_3300u:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:ryzen_3_3300u:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-56-0-1-0&quot;,&quot;id&quot;:&quot;15584911&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:57,&quot;dataTestId&quot;:&quot;vuln-software-config-57&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-57-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-57-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aryzen_3_3300x_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:ryzen_3_3300x_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:ryzen_3_3300x_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-57-0-0-0&quot;,&quot;id&quot;:&quot;15584908&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-57-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aryzen_3_3300x%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:ryzen_3_3300x:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-57-0-1-0&quot;,&quot;id&quot;:&quot;15584909&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:58,&quot;dataTestId&quot;:&quot;vuln-software-config-58&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-58-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-58-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aryzen_5_3400g_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:ryzen_5_3400g_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:ryzen_5_3400g_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-58-0-0-0&quot;,&quot;id&quot;:&quot;15584906&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-58-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aryzen_5_3400g%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:ryzen_5_3400g:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:ryzen_5_3400g:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-58-0-1-0&quot;,&quot;id&quot;:&quot;15584907&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:59,&quot;dataTestId&quot;:&quot;vuln-software-config-59&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-59-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-59-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aryzen_5_3450g_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:ryzen_5_3450g_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:ryzen_5_3450g_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-59-0-0-0&quot;,&quot;id&quot;:&quot;15584904&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-59-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aryzen_5_3450g%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:ryzen_5_3450g:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:ryzen_5_3450g:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-59-0-1-0&quot;,&quot;id&quot;:&quot;15584905&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:60,&quot;dataTestId&quot;:&quot;vuln-software-config-60&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-60-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-60-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aryzen_5_3500u_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:ryzen_5_3500u_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:ryzen_5_3500u_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-60-0-0-0&quot;,&quot;id&quot;:&quot;15584882&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-60-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aryzen_5_3500u%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:ryzen_5_3500u:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:ryzen_5_3500u:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-60-0-1-0&quot;,&quot;id&quot;:&quot;15584903&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:61,&quot;dataTestId&quot;:&quot;vuln-software-config-61&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-61-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-61-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aryzen_5_3550h_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:ryzen_5_3550h_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:ryzen_5_3550h_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-61-0-0-0&quot;,&quot;id&quot;:&quot;15584883&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-61-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aryzen_5_3550h%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:ryzen_5_3550h:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:ryzen_5_3550h:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-61-0-1-0&quot;,&quot;id&quot;:&quot;15584884&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:62,&quot;dataTestId&quot;:&quot;vuln-software-config-62&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-62-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-62-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aryzen_5_3600_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:ryzen_5_3600_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:ryzen_5_3600_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-62-0-0-0&quot;,&quot;id&quot;:&quot;15584885&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-62-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aryzen_5_3600%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:ryzen_5_3600:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:ryzen_5_3600:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-62-0-1-0&quot;,&quot;id&quot;:&quot;15584886&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:63,&quot;dataTestId&quot;:&quot;vuln-software-config-63&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-63-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-63-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aryzen_5_3600x_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:ryzen_5_3600x_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:ryzen_5_3600x_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-63-0-0-0&quot;,&quot;id&quot;:&quot;15584887&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-63-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aryzen_5_3600x%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:ryzen_5_3600x:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:ryzen_5_3600x:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-63-0-1-0&quot;,&quot;id&quot;:&quot;15584888&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:64,&quot;dataTestId&quot;:&quot;vuln-software-config-64&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-64-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-64-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aryzen_5_3600xt_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:ryzen_5_3600xt_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:ryzen_5_3600xt_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-64-0-0-0&quot;,&quot;id&quot;:&quot;15584889&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-64-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aryzen_5_3600xt%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:ryzen_5_3600xt:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:ryzen_5_3600xt:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-64-0-1-0&quot;,&quot;id&quot;:&quot;15584890&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:65,&quot;dataTestId&quot;:&quot;vuln-software-config-65&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-65-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-65-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aryzen_7_3700u_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:ryzen_7_3700u_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:ryzen_7_3700u_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-65-0-0-0&quot;,&quot;id&quot;:&quot;15584891&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-65-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aryzen_7_3700u%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:ryzen_7_3700u:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:ryzen_7_3700u:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-65-0-1-0&quot;,&quot;id&quot;:&quot;15584892&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:66,&quot;dataTestId&quot;:&quot;vuln-software-config-66&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-66-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-66-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aryzen_7_3700x_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:ryzen_7_3700x_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:ryzen_7_3700x_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-66-0-0-0&quot;,&quot;id&quot;:&quot;15584893&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-66-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aryzen_7_3700x%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:ryzen_7_3700x:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:ryzen_7_3700x:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-66-0-1-0&quot;,&quot;id&quot;:&quot;15584894&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:67,&quot;dataTestId&quot;:&quot;vuln-software-config-67&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-67-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-67-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aryzen_7_3750h_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:ryzen_7_3750h_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:ryzen_7_3750h_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-67-0-0-0&quot;,&quot;id&quot;:&quot;15584895&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-67-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aryzen_7_3750h%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:ryzen_7_3750h:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:ryzen_7_3750h:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-67-0-1-0&quot;,&quot;id&quot;:&quot;15584896&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:68,&quot;dataTestId&quot;:&quot;vuln-software-config-68&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-68-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-68-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aryzen_7_3800x_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:ryzen_7_3800x_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:ryzen_7_3800x_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-68-0-0-0&quot;,&quot;id&quot;:&quot;15584897&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-68-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aryzen_7_3800x%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:ryzen_7_3800x:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:ryzen_7_3800x:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-68-0-1-0&quot;,&quot;id&quot;:&quot;15584898&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:69,&quot;dataTestId&quot;:&quot;vuln-software-config-69&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-69-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-69-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aryzen_7_3800xt_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:ryzen_7_3800xt_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:ryzen_7_3800xt_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-69-0-0-0&quot;,&quot;id&quot;:&quot;15584899&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-69-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aryzen_7_3800xt%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:ryzen_7_3800xt:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:ryzen_7_3800xt:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-69-0-1-0&quot;,&quot;id&quot;:&quot;15584900&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:70,&quot;dataTestId&quot;:&quot;vuln-software-config-70&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-70-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-70-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aryzen_7_4700g_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:ryzen_7_4700g_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:ryzen_7_4700g_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-70-0-0-0&quot;,&quot;id&quot;:&quot;15584901&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-70-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aryzen_7_4700g%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:ryzen_7_4700g:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:ryzen_7_4700g:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-70-0-1-0&quot;,&quot;id&quot;:&quot;15584902&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:71,&quot;dataTestId&quot;:&quot;vuln-software-config-71&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-71-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-71-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aryzen_7_4700ge_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:ryzen_7_4700ge_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:ryzen_7_4700ge_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-71-0-0-0&quot;,&quot;id&quot;:&quot;15584920&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-71-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aryzen_7_4700ge%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:ryzen_7_4700ge:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:ryzen_7_4700ge:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-71-0-1-0&quot;,&quot;id&quot;:&quot;15584921&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:72,&quot;dataTestId&quot;:&quot;vuln-software-config-72&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-72-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-72-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aryzen_5_4600g_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:ryzen_5_4600g_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:ryzen_5_4600g_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-72-0-0-0&quot;,&quot;id&quot;:&quot;15584922&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-72-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aryzen_5_4600g%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:ryzen_5_4600g:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:ryzen_5_4600g:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-72-0-1-0&quot;,&quot;id&quot;:&quot;15584923&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:73,&quot;dataTestId&quot;:&quot;vuln-software-config-73&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-73-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-73-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aryzen_5_4600ge_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:ryzen_5_4600ge_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:ryzen_5_4600ge_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-73-0-0-0&quot;,&quot;id&quot;:&quot;15584924&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-73-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aryzen_5_4600ge%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:ryzen_5_4600ge:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:ryzen_5_4600ge:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-73-0-1-0&quot;,&quot;id&quot;:&quot;15584925&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:74,&quot;dataTestId&quot;:&quot;vuln-software-config-74&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-74-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-74-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aryzen_3_4300g_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:ryzen_3_4300g_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:ryzen_3_4300g_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-74-0-0-0&quot;,&quot;id&quot;:&quot;15584926&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-74-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aryzen_3_4300g%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:ryzen_3_4300g:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:ryzen_3_4300g:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-74-0-1-0&quot;,&quot;id&quot;:&quot;15584927&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:75,&quot;dataTestId&quot;:&quot;vuln-software-config-75&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-75-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-75-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aryzen_3_4300ge_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:ryzen_3_4300ge_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:ryzen_3_4300ge_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-75-0-0-0&quot;,&quot;id&quot;:&quot;15584928&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-75-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aryzen_3_4300ge%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:ryzen_3_4300ge:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:ryzen_3_4300ge:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-75-0-1-0&quot;,&quot;id&quot;:&quot;15584929&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:76,&quot;dataTestId&quot;:&quot;vuln-software-config-76&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-76-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-76-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aryzen_9_4900h_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:ryzen_9_4900h_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:ryzen_9_4900h_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-76-0-0-0&quot;,&quot;id&quot;:&quot;15584930&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-76-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aryzen_9_4900h%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:ryzen_9_4900h:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:ryzen_9_4900h:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-76-0-1-0&quot;,&quot;id&quot;:&quot;15584931&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:77,&quot;dataTestId&quot;:&quot;vuln-software-config-77&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-77-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-77-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aryzen_7_4800u_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:ryzen_7_4800u_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:ryzen_7_4800u_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-77-0-0-0&quot;,&quot;id&quot;:&quot;15584932&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-77-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aryzen_7_4800u%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:ryzen_7_4800u:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:ryzen_7_4800u:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-77-0-1-0&quot;,&quot;id&quot;:&quot;15584933&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:78,&quot;dataTestId&quot;:&quot;vuln-software-config-78&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-78-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-78-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aryzen_7_4700u_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:ryzen_7_4700u_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:ryzen_7_4700u_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-78-0-0-0&quot;,&quot;id&quot;:&quot;15584934&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-78-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aryzen_7_4700u%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:ryzen_7_4700u:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:ryzen_7_4700u:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-78-0-1-0&quot;,&quot;id&quot;:&quot;15584935&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:79,&quot;dataTestId&quot;:&quot;vuln-software-config-79&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-79-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-79-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aryzen_7_4800h_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:ryzen_7_4800h_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:ryzen_7_4800h_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-79-0-0-0&quot;,&quot;id&quot;:&quot;15584936&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-79-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aryzen_7_4800h%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:ryzen_7_4800h:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:ryzen_7_4800h:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-79-0-1-0&quot;,&quot;id&quot;:&quot;15584937&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:80,&quot;dataTestId&quot;:&quot;vuln-software-config-80&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-80-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-80-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aryzen_5_4600u_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:ryzen_5_4600u_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:ryzen_5_4600u_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-80-0-0-0&quot;,&quot;id&quot;:&quot;15584938&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-80-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aryzen_5_4600u%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:ryzen_5_4600u:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:ryzen_5_4600u:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-80-0-1-0&quot;,&quot;id&quot;:&quot;15584939&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:81,&quot;dataTestId&quot;:&quot;vuln-software-config-81&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-81-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-81-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aryzen_5_4500u_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:ryzen_5_4500u_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:ryzen_5_4500u_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-81-0-0-0&quot;,&quot;id&quot;:&quot;15584940&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-81-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aryzen_5_4500u%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:ryzen_5_4500u:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:ryzen_5_4500u:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-81-0-1-0&quot;,&quot;id&quot;:&quot;15584941&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:82,&quot;dataTestId&quot;:&quot;vuln-software-config-82&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-82-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-82-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aryzen_5_4600h_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:ryzen_5_4600h_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:ryzen_5_4600h_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-82-0-0-0&quot;,&quot;id&quot;:&quot;15584942&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-82-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aryzen_5_4600h%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:ryzen_5_4600h:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:ryzen_5_4600h:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-82-0-1-0&quot;,&quot;id&quot;:&quot;15584943&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:83,&quot;dataTestId&quot;:&quot;vuln-software-config-83&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-83-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-83-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aryzen_3_4300u_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:ryzen_3_4300u_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:ryzen_3_4300u_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-83-0-0-0&quot;,&quot;id&quot;:&quot;15584944&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-83-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aryzen_3_4300u%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:ryzen_3_4300u:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:ryzen_3_4300u:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-83-0-1-0&quot;,&quot;id&quot;:&quot;15584945&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:84,&quot;dataTestId&quot;:&quot;vuln-software-config-84&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-84-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-84-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aathlon_gold_3150u_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:athlon_gold_3150u_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:athlon_gold_3150u_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-84-0-0-0&quot;,&quot;id&quot;:&quot;15584946&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-84-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aathlon_gold_3150u%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:athlon_gold_3150u:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:athlon_gold_3150u:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-84-0-1-0&quot;,&quot;id&quot;:&quot;15584947&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:85,&quot;dataTestId&quot;:&quot;vuln-software-config-85&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-85-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-85-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aathlon_silver_3050u_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:athlon_silver_3050u_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:athlon_silver_3050u_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-85-0-0-0&quot;,&quot;id&quot;:&quot;15584948&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-85-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aathlon_silver_3050u%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:athlon_silver_3050u:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:athlon_silver_3050u:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-85-0-1-0&quot;,&quot;id&quot;:&quot;15584949&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:86,&quot;dataTestId&quot;:&quot;vuln-software-config-86&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-86-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-86-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aepyc_7001_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:epyc_7001_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:epyc_7001_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-86-0-0-0&quot;,&quot;id&quot;:&quot;15584950&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-86-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aepyc_7001%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:epyc_7001:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:epyc_7001:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-86-0-1-0&quot;,&quot;id&quot;:&quot;15584951&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:87,&quot;dataTestId&quot;:&quot;vuln-software-config-87&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-87-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-87-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aepyc_7251_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:epyc_7251_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:epyc_7251_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-87-0-0-0&quot;,&quot;id&quot;:&quot;15584952&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-87-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aepyc_7251%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:epyc_7251:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:epyc_7251:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-87-0-1-0&quot;,&quot;id&quot;:&quot;15584953&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:88,&quot;dataTestId&quot;:&quot;vuln-software-config-88&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-88-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-88-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aepyc_7261_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:epyc_7261_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:epyc_7261_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-88-0-0-0&quot;,&quot;id&quot;:&quot;15584954&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-88-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aepyc_7261%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:epyc_7261:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:epyc_7261:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-88-0-1-0&quot;,&quot;id&quot;:&quot;15584955&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:89,&quot;dataTestId&quot;:&quot;vuln-software-config-89&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-89-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-89-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aepyc_7281_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:epyc_7281_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:epyc_7281_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-89-0-0-0&quot;,&quot;id&quot;:&quot;15584956&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-89-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aepyc_7281%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:epyc_7281:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:epyc_7281:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-89-0-1-0&quot;,&quot;id&quot;:&quot;15584957&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:90,&quot;dataTestId&quot;:&quot;vuln-software-config-90&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-90-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-90-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aepyc_7301_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:epyc_7301_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:epyc_7301_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-90-0-0-0&quot;,&quot;id&quot;:&quot;15584958&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-90-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aepyc_7301%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:epyc_7301:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:epyc_7301:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-90-0-1-0&quot;,&quot;id&quot;:&quot;15584959&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:91,&quot;dataTestId&quot;:&quot;vuln-software-config-91&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-91-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-91-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aepyc_7351_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:epyc_7351_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:epyc_7351_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-91-0-0-0&quot;,&quot;id&quot;:&quot;15584960&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-91-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aepyc_7351%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:epyc_7351:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:epyc_7351:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-91-0-1-0&quot;,&quot;id&quot;:&quot;15584961&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:92,&quot;dataTestId&quot;:&quot;vuln-software-config-92&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-92-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-92-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aepyc_7351p_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:epyc_7351p_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:epyc_7351p_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-92-0-0-0&quot;,&quot;id&quot;:&quot;15584962&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-92-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aepyc_7351p%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:epyc_7351p:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:epyc_7351p:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-92-0-1-0&quot;,&quot;id&quot;:&quot;15584963&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:93,&quot;dataTestId&quot;:&quot;vuln-software-config-93&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-93-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-93-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aepyc_7371_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:epyc_7371_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:epyc_7371_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-93-0-0-0&quot;,&quot;id&quot;:&quot;15584964&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-93-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aepyc_7371%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:epyc_7371:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:epyc_7371:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-93-0-1-0&quot;,&quot;id&quot;:&quot;15584965&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:94,&quot;dataTestId&quot;:&quot;vuln-software-config-94&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-94-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-94-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aepyc_7401_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:epyc_7401_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:epyc_7401_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-94-0-0-0&quot;,&quot;id&quot;:&quot;15584966&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-94-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aepyc_7401%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:epyc_7401:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:epyc_7401:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-94-0-1-0&quot;,&quot;id&quot;:&quot;15584967&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:95,&quot;dataTestId&quot;:&quot;vuln-software-config-95&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-95-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-95-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aepyc_7401p_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:epyc_7401p_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:epyc_7401p_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-95-0-0-0&quot;,&quot;id&quot;:&quot;15584968&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-95-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aepyc_7401p%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:epyc_7401p:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:epyc_7401p:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-95-0-1-0&quot;,&quot;id&quot;:&quot;15584969&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:96,&quot;dataTestId&quot;:&quot;vuln-software-config-96&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-96-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-96-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aepyc_7451_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:epyc_7451_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:epyc_7451_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-96-0-0-0&quot;,&quot;id&quot;:&quot;15584970&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-96-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aepyc_7451%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:epyc_7451:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:epyc_7451:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-96-0-1-0&quot;,&quot;id&quot;:&quot;15584971&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:97,&quot;dataTestId&quot;:&quot;vuln-software-config-97&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-97-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-97-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aepyc_7501_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:epyc_7501_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:epyc_7501_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-97-0-0-0&quot;,&quot;id&quot;:&quot;15584972&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-97-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aepyc_7501%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:epyc_7501:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:epyc_7501:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-97-0-1-0&quot;,&quot;id&quot;:&quot;15584973&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:98,&quot;dataTestId&quot;:&quot;vuln-software-config-98&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-98-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-98-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aepyc_7551_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:epyc_7551_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:epyc_7551_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-98-0-0-0&quot;,&quot;id&quot;:&quot;15584974&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-98-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aepyc_7551%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:epyc_7551:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:epyc_7551:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-98-0-1-0&quot;,&quot;id&quot;:&quot;15584975&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:99,&quot;dataTestId&quot;:&quot;vuln-software-config-99&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-99-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-99-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aepyc_7551p_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:epyc_7551p_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:epyc_7551p_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-99-0-0-0&quot;,&quot;id&quot;:&quot;15584976&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-99-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aepyc_7551p%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:epyc_7551p:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:epyc_7551p:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-99-0-1-0&quot;,&quot;id&quot;:&quot;15584977&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:100,&quot;dataTestId&quot;:&quot;vuln-software-config-100&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-100-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-100-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aepyc_7601_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:epyc_7601_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:epyc_7601_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-100-0-0-0&quot;,&quot;id&quot;:&quot;15584978&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-100-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aepyc_7601%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:epyc_7601:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:epyc_7601:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-100-0-1-0&quot;,&quot;id&quot;:&quot;15584979&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:101,&quot;dataTestId&quot;:&quot;vuln-software-config-101&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-101-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-101-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aepyc_7002_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:epyc_7002_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:epyc_7002_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-101-0-0-0&quot;,&quot;id&quot;:&quot;15584980&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-101-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aepyc_7002%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:epyc_7002:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:epyc_7002:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-101-0-1-0&quot;,&quot;id&quot;:&quot;15584981&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:102,&quot;dataTestId&quot;:&quot;vuln-software-config-102&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-102-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-102-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aepyc_7252_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:epyc_7252_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:epyc_7252_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-102-0-0-0&quot;,&quot;id&quot;:&quot;15584982&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-102-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aepyc_7252%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:epyc_7252:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-102-0-1-0&quot;,&quot;id&quot;:&quot;15584983&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:103,&quot;dataTestId&quot;:&quot;vuln-software-config-103&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-103-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-103-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aepyc_7262_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:epyc_7262_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:epyc_7262_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-103-0-0-0&quot;,&quot;id&quot;:&quot;15584984&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-103-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aepyc_7262%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:epyc_7262:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-103-0-1-0&quot;,&quot;id&quot;:&quot;15584985&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:104,&quot;dataTestId&quot;:&quot;vuln-software-config-104&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-104-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-104-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aepyc_7272_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:epyc_7272_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:epyc_7272_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-104-0-0-0&quot;,&quot;id&quot;:&quot;15584986&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-104-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aepyc_7272%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:epyc_7272:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-104-0-1-0&quot;,&quot;id&quot;:&quot;15584987&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:105,&quot;dataTestId&quot;:&quot;vuln-software-config-105&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-105-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-105-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aepyc_7282_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:epyc_7282_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:epyc_7282_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-105-0-0-0&quot;,&quot;id&quot;:&quot;15584988&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-105-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aepyc_7282%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:epyc_7282:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-105-0-1-0&quot;,&quot;id&quot;:&quot;15584989&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:106,&quot;dataTestId&quot;:&quot;vuln-software-config-106&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-106-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-106-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aepyc_7302_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:epyc_7302_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:epyc_7302_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-106-0-0-0&quot;,&quot;id&quot;:&quot;15584990&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-106-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aepyc_7302%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:epyc_7302:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-106-0-1-0&quot;,&quot;id&quot;:&quot;15584991&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:107,&quot;dataTestId&quot;:&quot;vuln-software-config-107&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-107-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-107-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aepyc_7302p_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:epyc_7302p_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:epyc_7302p_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-107-0-0-0&quot;,&quot;id&quot;:&quot;15584992&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-107-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aepyc_7302p%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:epyc_7302p:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-107-0-1-0&quot;,&quot;id&quot;:&quot;15584993&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:108,&quot;dataTestId&quot;:&quot;vuln-software-config-108&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-108-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-108-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aepyc_7352_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:epyc_7352_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:epyc_7352_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-108-0-0-0&quot;,&quot;id&quot;:&quot;15584994&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-108-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aepyc_7352%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:epyc_7352:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-108-0-1-0&quot;,&quot;id&quot;:&quot;15584995&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:109,&quot;dataTestId&quot;:&quot;vuln-software-config-109&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-109-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-109-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aepyc_7402_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:epyc_7402_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:epyc_7402_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-109-0-0-0&quot;,&quot;id&quot;:&quot;15584996&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-109-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aepyc_7402%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:epyc_7402:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-109-0-1-0&quot;,&quot;id&quot;:&quot;15584997&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:110,&quot;dataTestId&quot;:&quot;vuln-software-config-110&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-110-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-110-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aepyc_7402p_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:epyc_7402p_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:epyc_7402p_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-110-0-0-0&quot;,&quot;id&quot;:&quot;15584998&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-110-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aepyc_7402p%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:epyc_7402p:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-110-0-1-0&quot;,&quot;id&quot;:&quot;15584999&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:111,&quot;dataTestId&quot;:&quot;vuln-software-config-111&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-111-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-111-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aepyc_7452_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:epyc_7452_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:epyc_7452_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-111-0-0-0&quot;,&quot;id&quot;:&quot;15585000&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-111-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aepyc_7452%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:epyc_7452:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-111-0-1-0&quot;,&quot;id&quot;:&quot;15585001&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:112,&quot;dataTestId&quot;:&quot;vuln-software-config-112&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-112-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-112-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aepyc_7502_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:epyc_7502_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:epyc_7502_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-112-0-0-0&quot;,&quot;id&quot;:&quot;15585002&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-112-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aepyc_7502%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:epyc_7502:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-112-0-1-0&quot;,&quot;id&quot;:&quot;15585003&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:113,&quot;dataTestId&quot;:&quot;vuln-software-config-113&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-113-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-113-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aepyc_7502p_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:epyc_7502p_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:epyc_7502p_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-113-0-0-0&quot;,&quot;id&quot;:&quot;15585004&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-113-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aepyc_7502p%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:epyc_7502p:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-113-0-1-0&quot;,&quot;id&quot;:&quot;15585005&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:114,&quot;dataTestId&quot;:&quot;vuln-software-config-114&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-114-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-114-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aepyc_7532_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:epyc_7532_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:epyc_7532_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-114-0-0-0&quot;,&quot;id&quot;:&quot;15585006&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-114-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aepyc_7532%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:epyc_7532:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-114-0-1-0&quot;,&quot;id&quot;:&quot;15585007&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:115,&quot;dataTestId&quot;:&quot;vuln-software-config-115&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-115-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-115-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aepyc_7542_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:epyc_7542_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:epyc_7542_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-115-0-0-0&quot;,&quot;id&quot;:&quot;15585008&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-115-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aepyc_7542%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:epyc_7542:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-115-0-1-0&quot;,&quot;id&quot;:&quot;15585009&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:116,&quot;dataTestId&quot;:&quot;vuln-software-config-116&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-116-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-116-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aepyc_7552_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:epyc_7552_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:epyc_7552_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-116-0-0-0&quot;,&quot;id&quot;:&quot;15585010&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-116-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aepyc_7552%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:epyc_7552:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-116-0-1-0&quot;,&quot;id&quot;:&quot;15585011&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:117,&quot;dataTestId&quot;:&quot;vuln-software-config-117&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-117-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-117-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aepyc_7642_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:epyc_7642_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:epyc_7642_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-117-0-0-0&quot;,&quot;id&quot;:&quot;15585012&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-117-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aepyc_7642%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:epyc_7642:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-117-0-1-0&quot;,&quot;id&quot;:&quot;15585013&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:118,&quot;dataTestId&quot;:&quot;vuln-software-config-118&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-118-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-118-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aepyc_7662_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:epyc_7662_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:epyc_7662_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-118-0-0-0&quot;,&quot;id&quot;:&quot;15585014&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-118-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aepyc_7662%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:epyc_7662:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-118-0-1-0&quot;,&quot;id&quot;:&quot;15585015&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:119,&quot;dataTestId&quot;:&quot;vuln-software-config-119&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-119-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-119-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aepyc_7702_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:epyc_7702_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:epyc_7702_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-119-0-0-0&quot;,&quot;id&quot;:&quot;15585016&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-119-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aepyc_7702%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:epyc_7702:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-119-0-1-0&quot;,&quot;id&quot;:&quot;15585017&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:120,&quot;dataTestId&quot;:&quot;vuln-software-config-120&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-120-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-120-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aepyc_7742_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:epyc_7742_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:epyc_7742_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-120-0-0-0&quot;,&quot;id&quot;:&quot;15585018&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-120-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aepyc_7742%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:epyc_7742:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-120-0-1-0&quot;,&quot;id&quot;:&quot;15585019&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:121,&quot;dataTestId&quot;:&quot;vuln-software-config-121&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-121-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-121-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aepyc_7f32_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:epyc_7f32_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:epyc_7f32_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-121-0-0-0&quot;,&quot;id&quot;:&quot;15585020&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-121-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aepyc_7f32%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:epyc_7f32:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-121-0-1-0&quot;,&quot;id&quot;:&quot;15585021&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:122,&quot;dataTestId&quot;:&quot;vuln-software-config-122&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-122-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-122-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aepyc_7f52_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:epyc_7f52_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:epyc_7f52_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-122-0-0-0&quot;,&quot;id&quot;:&quot;15585022&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-122-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aepyc_7f52%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:epyc_7f52:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-122-0-1-0&quot;,&quot;id&quot;:&quot;15585023&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:123,&quot;dataTestId&quot;:&quot;vuln-software-config-123&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-123-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-123-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aepyc_7f72_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:epyc_7f72_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:epyc_7f72_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-123-0-0-0&quot;,&quot;id&quot;:&quot;15585024&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-123-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aepyc_7f72%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:epyc_7f72:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-123-0-1-0&quot;,&quot;id&quot;:&quot;15585025&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]},{&quot;id&quot;:124,&quot;dataTestId&quot;:&quot;vuln-software-config-124&quot;,&quot;totalCpeCount&quot;:2,&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;AND&quot;,&quot;depth&quot;:1,&quot;dataTestId&quot;:&quot;vuln-software-operator-124-0&quot;,&quot;configType&quot;:&quot;RUNNING_ON&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[],&quot;containers&quot;:[{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-124-0-0&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:true,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ao%3Aamd%3Aepyc_7h12_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:o:amd:epyc_7h12_firmware:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/o:amd:epyc_7h12_firmware:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-124-0-0-0&quot;,&quot;id&quot;:&quot;15585026&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]},{&quot;negate&quot;:false,&quot;operator&quot;:&quot;OR&quot;,&quot;depth&quot;:2,&quot;dataTestId&quot;:&quot;vuln-software-operator-124-0-1&quot;,&quot;configType&quot;:&quot;&quot;,&quot;cpeListType&quot;:&quot;NON_VULNERABLE&quot;,&quot;cpes&quot;:[{&quot;depth&quot;:3,&quot;vulnerable&quot;:false,&quot;previous&quot;:false,&quot;urlName&quot;:&quot;cpe%3A2.3%3Ah%3Aamd%3Aepyc_7h12%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*&quot;,&quot;cpe23Uri&quot;:&quot;cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*&quot;,&quot;cpe22Uri&quot;:&quot;cpe:/h:amd:epyc_7h12:-&quot;,&quot;status&quot;:null,&quot;resultingCpes&quot;:null,&quot;dataTestId&quot;:&quot;vuln-software-cpe-124-0-1-0&quot;,&quot;id&quot;:&quot;15585027&quot;,&quot;matchCpes&quot;:[],&quot;rangeDescription&quot;:&quot;&quot;,&quot;rangeStartType&quot;:&quot;&quot;,&quot;rangeStartVersion&quot;:&quot;&quot;,&quot;rangeEndType&quot;:&quot;&quot;,&quot;rangeEndVersion&quot;:&quot;&quot;,&quot;rangeId&quot;:&quot;&quot;,&quot;rangeCpes&quot;:[]}],&quot;containers&quot;:[]}]}]}]"/>
<p id="vulnCpeInfo" >
<small>
<i class="fa fa-bug fa-flip-vertical"></i> Denotes Vulnerable Software<br />
<a href="mailto:cpe_dictionary@nist.gov">Are we missing a CPE here? Please let us know</a>.<br />
</small>
</p>
<script src="/site-media/js/vulnerability/cpe-match.js"
type="text/javascript"></script>
<script src="/site-media/js/vulnerability/configurationListing.js"
type="text/javascript"></script>
</div>
</div>
<div id="vulnChangeHistoryDiv"
data-testid="vuln-change-history-container">
<h3 id="VulnChangeHistorySection">Change History</h3>
<small> 19 change records found <a href="#VulnChangeHistorySection"
style="text-decoration: underline" id="changeHistoryToggle">show
changes</a>
</small>
<div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-0">CVE Modified by CVE</span> <span
data-testid="vuln-change-history-date-0">11/21/2024 1:59:55 AM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">https://lists.debian.org/debian-lts-announce/2022/09/msg00011.html</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYI3OMJ7RIZNL3C6GUWNANNPEUUID6FM/</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">https://security.gentoo.org/glsa/202402-07</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1037</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">https://www.debian.org/security/2022/dsa-5207</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-0">
<td
data-testid="vuln-change-history-0-action">Added</td>
<td
data-testid="vuln-change-history-0-type">Reference</td>
<td data-testid="vuln-change-history-0-old">
</td>
<td data-testid="vuln-change-history-0-new">
<pre style="word-break: break-all !important">https://www.secpod.com/blog/retbleed-intel-and-amd-processor-information-disclosure-vulnerability/</pre>
<br/>
<br />
</td>
</tr>
</tbody>
</table>
</div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-1">CVE Modified by Advanced Micro Devices Inc.</span> <span
data-testid="vuln-change-history-date-1">5/14/2024 6:30:44 AM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
</tbody>
</table>
</div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-2">CVE Modified by Advanced Micro Devices Inc.</span> <span
data-testid="vuln-change-history-date-2">2/04/2024 3:15:10 AM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-change-history-2">
<td
data-testid="vuln-change-history-2-action">Added</td>
<td
data-testid="vuln-change-history-2-type">Reference</td>
<td data-testid="vuln-change-history-2-old">
</td>
<td data-testid="vuln-change-history-2-new">
<pre style="word-break: break-all !important">Advanced Micro Devices Inc. https://security.gentoo.org/glsa/202402-07 [No types assigned]</pre>
<br/>
<br />
</td>
</tr>
</tbody>
</table>
</div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-3">CVE Source Update by Advanced Micro Devices Inc.</span> <span
data-testid="vuln-change-history-date-3">11/06/2023 10:46:07 PM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-change-history-3">
<td
data-testid="vuln-change-history-3-action">Changed</td>
<td
data-testid="vuln-change-history-3-type">Source</td>
<td data-testid="vuln-change-history-3-old">
<pre style="word-break: break-all !important">Switzerland Government Common Vulnerability Program</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-3-new">
<pre style="word-break: break-all !important">Advanced Micro Devices Inc.</pre>
<br/>
<br />
</td>
</tr>
</tbody>
</table>
</div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-4">CVE Modified by Advanced Micro Devices Inc.</span> <span
data-testid="vuln-change-history-date-4">11/06/2023 10:46:07 PM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-change-history-4">
<td
data-testid="vuln-change-history-4-action">Added</td>
<td
data-testid="vuln-change-history-4-type">Reference</td>
<td data-testid="vuln-change-history-4-old">
</td>
<td data-testid="vuln-change-history-4-new">
<pre style="word-break: break-all !important">Advanced Micro Devices Inc. https://lists.debian.org/debian-lts-announce/2022/09/msg00011.html [No types assigned]</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-4">
<td
data-testid="vuln-change-history-4-action">Added</td>
<td
data-testid="vuln-change-history-4-type">Reference</td>
<td data-testid="vuln-change-history-4-old">
</td>
<td data-testid="vuln-change-history-4-new">
<pre style="word-break: break-all !important">Advanced Micro Devices Inc. https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYI3OMJ7RIZNL3C6GUWNANNPEUUID6FM/ [No types assigned]</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-4">
<td
data-testid="vuln-change-history-4-action">Added</td>
<td
data-testid="vuln-change-history-4-type">Reference</td>
<td data-testid="vuln-change-history-4-old">
</td>
<td data-testid="vuln-change-history-4-new">
<pre style="word-break: break-all !important">Advanced Micro Devices Inc. https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1037 [No types assigned]</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-4">
<td
data-testid="vuln-change-history-4-action">Added</td>
<td
data-testid="vuln-change-history-4-type">Reference</td>
<td data-testid="vuln-change-history-4-old">
</td>
<td data-testid="vuln-change-history-4-new">
<pre style="word-break: break-all !important">Advanced Micro Devices Inc. https://www.debian.org/security/2022/dsa-5207 [No types assigned]</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-4">
<td
data-testid="vuln-change-history-4-action">Added</td>
<td
data-testid="vuln-change-history-4-type">Reference</td>
<td data-testid="vuln-change-history-4-old">
</td>
<td data-testid="vuln-change-history-4-new">
<pre style="word-break: break-all !important">Advanced Micro Devices Inc. https://www.secpod.com/blog/retbleed-intel-and-amd-processor-information-disclosure-vulnerability/ [No types assigned]</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-4">
<td
data-testid="vuln-change-history-4-action">Removed</td>
<td
data-testid="vuln-change-history-4-type">Reference</td>
<td data-testid="vuln-change-history-4-old">
<pre style="word-break: break-all !important">Switzerland Government Common Vulnerability Program https://lists.debian.org/debian-lts-announce/2022/09/msg00011.html</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-4-new">
</td>
</tr>
<tr data-testid="vuln-change-history-4">
<td
data-testid="vuln-change-history-4-action">Removed</td>
<td
data-testid="vuln-change-history-4-type">Reference</td>
<td data-testid="vuln-change-history-4-old">
<pre style="word-break: break-all !important">Switzerland Government Common Vulnerability Program https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MYI3OMJ7RIZNL3C6GUWNANNPEUUID6FM/</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-4-new">
</td>
</tr>
<tr data-testid="vuln-change-history-4">
<td
data-testid="vuln-change-history-4-action">Removed</td>
<td
data-testid="vuln-change-history-4-type">Reference</td>
<td data-testid="vuln-change-history-4-old">
<pre style="word-break: break-all !important">Switzerland Government Common Vulnerability Program https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1037</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-4-new">
</td>
</tr>
<tr data-testid="vuln-change-history-4">
<td
data-testid="vuln-change-history-4-action">Removed</td>
<td
data-testid="vuln-change-history-4-type">Reference</td>
<td data-testid="vuln-change-history-4-old">
<pre style="word-break: break-all !important">Switzerland Government Common Vulnerability Program https://www.debian.org/security/2022/dsa-5207</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-4-new">
</td>
</tr>
<tr data-testid="vuln-change-history-4">
<td
data-testid="vuln-change-history-4-action">Removed</td>
<td
data-testid="vuln-change-history-4-type">Reference</td>
<td data-testid="vuln-change-history-4-old">
<pre style="word-break: break-all !important">Switzerland Government Common Vulnerability Program https://www.secpod.com/blog/retbleed-intel-and-amd-processor-information-disclosure-vulnerability/</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-4-new">
</td>
</tr>
</tbody>
</table>
</div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-5">CVE Modified by Switzerland Government Common Vulnerability Program</span> <span
data-testid="vuln-change-history-date-5">10/17/2023 2:15:10 PM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-change-history-5">
<td
data-testid="vuln-change-history-5-action">Added</td>
<td
data-testid="vuln-change-history-5-type">Reference</td>
<td data-testid="vuln-change-history-5-old">
</td>
<td data-testid="vuln-change-history-5-new">
<pre style="word-break: break-all !important">https://www.secpod.com/blog/retbleed-intel-and-amd-processor-information-disclosure-vulnerability/ [No Types Assigned]</pre>
<br/>
<br />
</td>
</tr>
</tbody>
</table>
</div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-6">Reanalysis by NIST</span> <span
data-testid="vuln-change-history-date-6">7/21/2023 12:55:40 PM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-change-history-6">
<td
data-testid="vuln-change-history-6-action">Added</td>
<td
data-testid="vuln-change-history-6-type">CWE</td>
<td data-testid="vuln-change-history-6-old">
</td>
<td data-testid="vuln-change-history-6-new">
<pre style="word-break: break-all !important">NIST CWE-212</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-6">
<td
data-testid="vuln-change-history-6-action">Removed</td>
<td
data-testid="vuln-change-history-6-type">CWE</td>
<td data-testid="vuln-change-history-6-old">
<pre style="word-break: break-all !important">NIST CWE-200</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-6-new">
</td>
</tr>
</tbody>
</table>
</div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-7">Modified Analysis by NIST</span> <span
data-testid="vuln-change-history-date-7">10/26/2022 2:16:34 PM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-change-history-7">
<td
data-testid="vuln-change-history-7-action">Changed</td>
<td
data-testid="vuln-change-history-7-type">Reference Type</td>
<td data-testid="vuln-change-history-7-old">
<pre style="word-break: break-all !important">https://lists.debian.org/debian-lts-announce/2022/09/msg00011.html No Types Assigned</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-7-new">
<pre style="word-break: break-all !important">https://lists.debian.org/debian-lts-announce/2022/09/msg00011.html Mailing List, Third Party Advisory</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-7">
<td
data-testid="vuln-change-history-7-action">Changed</td>
<td
data-testid="vuln-change-history-7-type">Reference Type</td>
<td data-testid="vuln-change-history-7-old">
<pre style="word-break: break-all !important">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MYI3OMJ7RIZNL3C6GUWNANNPEUUID6FM/ No Types Assigned</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-7-new">
<pre style="word-break: break-all !important">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MYI3OMJ7RIZNL3C6GUWNANNPEUUID6FM/ Mailing List, Third Party Advisory</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-7">
<td
data-testid="vuln-change-history-7-action">Changed</td>
<td
data-testid="vuln-change-history-7-type">Reference Type</td>
<td data-testid="vuln-change-history-7-old">
<pre style="word-break: break-all !important">https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1037 No Types Assigned</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-7-new">
<pre style="word-break: break-all !important">https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1037 Vendor Advisory</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-7">
<td
data-testid="vuln-change-history-7-action">Changed</td>
<td
data-testid="vuln-change-history-7-type">Reference Type</td>
<td data-testid="vuln-change-history-7-old">
<pre style="word-break: break-all !important">https://www.debian.org/security/2022/dsa-5207 No Types Assigned</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-7-new">
<pre style="word-break: break-all !important">https://www.debian.org/security/2022/dsa-5207 Third Party Advisory</pre>
<br/>
<br />
</td>
</tr>
</tbody>
</table>
</div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-8">CVE Modified by Switzerland Government Common Vulnerability Program</span> <span
data-testid="vuln-change-history-date-8">9/11/2022 6:15:12 PM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-change-history-8">
<td
data-testid="vuln-change-history-8-action">Added</td>
<td
data-testid="vuln-change-history-8-type">Reference</td>
<td data-testid="vuln-change-history-8-old">
</td>
<td data-testid="vuln-change-history-8-new">
<pre style="word-break: break-all !important">https://lists.debian.org/debian-lts-announce/2022/09/msg00011.html [No Types Assigned]</pre>
<br/>
<br />
</td>
</tr>
</tbody>
</table>
</div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-9">CVE Modified by Switzerland Government Common Vulnerability Program</span> <span
data-testid="vuln-change-history-date-9">8/16/2022 11:15:08 AM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-change-history-9">
<td
data-testid="vuln-change-history-9-action">Added</td>
<td
data-testid="vuln-change-history-9-type">Reference</td>
<td data-testid="vuln-change-history-9-old">
</td>
<td data-testid="vuln-change-history-9-new">
<pre style="word-break: break-all !important">https://www.debian.org/security/2022/dsa-5207 [No Types Assigned]</pre>
<br/>
<br />
</td>
</tr>
</tbody>
</table>
</div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-10">CVE Modified by Switzerland Government Common Vulnerability Program</span> <span
data-testid="vuln-change-history-date-10">8/12/2022 11:15:15 AM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-change-history-10">
<td
data-testid="vuln-change-history-10-action">Added</td>
<td
data-testid="vuln-change-history-10-type">Reference</td>
<td data-testid="vuln-change-history-10-old">
</td>
<td data-testid="vuln-change-history-10-new">
<pre style="word-break: break-all !important">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MYI3OMJ7RIZNL3C6GUWNANNPEUUID6FM/ [No Types Assigned]</pre>
<br/>
<br />
</td>
</tr>
</tbody>
</table>
</div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-11">CVE Modified by Switzerland Government Common Vulnerability Program</span> <span
data-testid="vuln-change-history-date-11">7/29/2022 4:15:13 PM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-change-history-11">
<td
data-testid="vuln-change-history-11-action">Changed</td>
<td
data-testid="vuln-change-history-11-type">Description</td>
<td data-testid="vuln-change-history-11-old">
<pre style="word-break: break-all !important">AMD microprocessor families 15h to 18h are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code execution under certain microarchitecture-dependent conditions.</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-11-new">
<pre style="word-break: break-all !important">Mis-trained branch predictions for return instructions may allow arbitrary speculative code execution under certain microarchitecture-dependent conditions.</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-11">
<td
data-testid="vuln-change-history-11-action">Removed</td>
<td
data-testid="vuln-change-history-11-type">CVSS V3.1</td>
<td data-testid="vuln-change-history-11-old">
<pre style="word-break: break-all !important">Switzerland Government Common Vulnerability Program AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-11-new">
</td>
</tr>
<tr data-testid="vuln-change-history-11">
<td
data-testid="vuln-change-history-11-action">Removed</td>
<td
data-testid="vuln-change-history-11-type">CWE</td>
<td data-testid="vuln-change-history-11-old">
<pre style="word-break: break-all !important">Switzerland Government Common Vulnerability Program CWE-200</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-11-new">
</td>
</tr>
<tr data-testid="vuln-change-history-11">
<td
data-testid="vuln-change-history-11-action">Added</td>
<td
data-testid="vuln-change-history-11-type">Reference</td>
<td data-testid="vuln-change-history-11-old">
</td>
<td data-testid="vuln-change-history-11-new">
<pre style="word-break: break-all !important">https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1037 [No Types Assigned]</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-11">
<td
data-testid="vuln-change-history-11-action">Removed</td>
<td
data-testid="vuln-change-history-11-type">Reference</td>
<td data-testid="vuln-change-history-11-old">
<pre style="word-break: break-all !important">http://www.openwall.com/lists/oss-security/2022/07/12/2 [Mailing List, Patch, Third Party Advisory]</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-11-new">
</td>
</tr>
<tr data-testid="vuln-change-history-11">
<td
data-testid="vuln-change-history-11-action">Removed</td>
<td
data-testid="vuln-change-history-11-type">Reference</td>
<td data-testid="vuln-change-history-11-old">
<pre style="word-break: break-all !important">http://www.openwall.com/lists/oss-security/2022/07/12/4 [Mailing List, Third Party Advisory]</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-11-new">
</td>
</tr>
<tr data-testid="vuln-change-history-11">
<td
data-testid="vuln-change-history-11-action">Removed</td>
<td
data-testid="vuln-change-history-11-type">Reference</td>
<td data-testid="vuln-change-history-11-old">
<pre style="word-break: break-all !important">http://www.openwall.com/lists/oss-security/2022/07/12/5 [Mailing List, Third Party Advisory]</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-11-new">
</td>
</tr>
<tr data-testid="vuln-change-history-11">
<td
data-testid="vuln-change-history-11-action">Removed</td>
<td
data-testid="vuln-change-history-11-type">Reference</td>
<td data-testid="vuln-change-history-11-old">
<pre style="word-break: break-all !important">http://www.openwall.com/lists/oss-security/2022/07/13/1 [Mailing List, Third Party Advisory]</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-11-new">
</td>
</tr>
<tr data-testid="vuln-change-history-11">
<td
data-testid="vuln-change-history-11-action">Removed</td>
<td
data-testid="vuln-change-history-11-type">Reference</td>
<td data-testid="vuln-change-history-11-old">
<pre style="word-break: break-all !important">http://xenbits.xen.org/xsa/advisory-407.html [Patch, Third Party Advisory]</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-11-new">
</td>
</tr>
<tr data-testid="vuln-change-history-11">
<td
data-testid="vuln-change-history-11-action">Removed</td>
<td
data-testid="vuln-change-history-11-type">Reference</td>
<td data-testid="vuln-change-history-11-old">
<pre style="word-break: break-all !important">https://comsec.ethz.ch/retbleed [Exploit, Third Party Advisory]</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-11-new">
</td>
</tr>
<tr data-testid="vuln-change-history-11">
<td
data-testid="vuln-change-history-11-action">Removed</td>
<td
data-testid="vuln-change-history-11-type">Reference</td>
<td data-testid="vuln-change-history-11-old">
<pre style="word-break: break-all !important">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D4RW5FCIYFNCQOEFJEUIRW3DGYW7CWBG/ [Mailing List, Third Party Advisory]</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-11-new">
</td>
</tr>
<tr data-testid="vuln-change-history-11">
<td
data-testid="vuln-change-history-11-action">Removed</td>
<td
data-testid="vuln-change-history-11-type">Reference</td>
<td data-testid="vuln-change-history-11-old">
<pre style="word-break: break-all !important">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KLSRW4LLTAT3CZMOYVNTC7YIYGX3KLED/ [Mailing List, Third Party Advisory]</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-11-new">
</td>
</tr>
<tr data-testid="vuln-change-history-11">
<td
data-testid="vuln-change-history-11-action">Removed</td>
<td
data-testid="vuln-change-history-11-type">Reference</td>
<td data-testid="vuln-change-history-11-old">
<pre style="word-break: break-all !important">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M27MB3QFNIJV4EQQSXWARHP3OGX6CR6K/ [Mailing List, Third Party Advisory]</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-11-new">
</td>
</tr>
<tr data-testid="vuln-change-history-11">
<td
data-testid="vuln-change-history-11-action">Removed</td>
<td
data-testid="vuln-change-history-11-type">Reference</td>
<td data-testid="vuln-change-history-11-old">
<pre style="word-break: break-all !important">https://www.debian.org/security/2022/dsa-5184 [Third Party Advisory]</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-11-new">
</td>
</tr>
<tr data-testid="vuln-change-history-11">
<td
data-testid="vuln-change-history-11-action">Removed</td>
<td
data-testid="vuln-change-history-11-type">CVSS V3.1 Reason</td>
<td data-testid="vuln-change-history-11-old">
<pre style="word-break: break-all !important">AC-No Race Condition</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-11-new">
</td>
</tr>
</tbody>
</table>
</div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-12">Initial Analysis by NIST</span> <span
data-testid="vuln-change-history-date-12">7/22/2022 5:54:23 PM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CVSS V3.1</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">NIST AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CVSS V2</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">NIST (AV:L/AC:L/Au:N/C:P/I:N/A:N)</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CWE</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">NIST CWE-200</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:a10-9600p_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:a10-9600p:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:a10-9630p_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:a10-9630p:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:a12-9700p_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:a12-9700p:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:a12-9730p_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:a12-9730p:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:a4-9120_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:a4-9120:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:a6-9210_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:a6-9210:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:a6-9220_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:a6-9220:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:a6-9220c_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:a6-9220c:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:a9-9410_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:a9-9410:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:a9-9420_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:a9-9420:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:athlon_gold_3150u_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:athlon_gold_3150u:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:athlon_silver_3050u_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:athlon_silver_3050u:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:athlon_x4_750_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:athlon_x4_750:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:athlon_x4_760k_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:athlon_x4_760k:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:athlon_x4_830_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:athlon_x4_830:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:athlon_x4_835_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:athlon_x4_835:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:athlon_x4_840_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:athlon_x4_840:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:athlon_x4_845_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:athlon_x4_845:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:athlon_x4_860k_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:athlon_x4_860k:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:athlon_x4_870k_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:athlon_x4_870k:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:athlon_x4_880k_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:athlon_x4_880k:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:athlon_x4_940_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:athlon_x4_940:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:athlon_x4_950_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:athlon_x4_950:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:athlon_x4_970_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:athlon_x4_970:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:epyc_7001_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:epyc_7001:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:epyc_7002_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:epyc_7002:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:epyc_7251_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:epyc_7251:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:epyc_7252_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:epyc_7261_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:epyc_7261:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:epyc_7262_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:epyc_7272_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:epyc_7281_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:epyc_7281:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:epyc_7282_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:epyc_7301_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:epyc_7301:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:epyc_7302_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:epyc_7302p_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:epyc_7351_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:epyc_7351:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:epyc_7351p_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:epyc_7351p:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:epyc_7352_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:epyc_7371_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:epyc_7371:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:epyc_7401_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:epyc_7401:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:epyc_7401p_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:epyc_7401p:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:epyc_7402_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:epyc_7402p_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:epyc_7451_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:epyc_7451:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:epyc_7452_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:epyc_7501_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:epyc_7501:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:epyc_7502_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:epyc_7502p_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:epyc_7532_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:epyc_7542_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:epyc_7551_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:epyc_7551:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:epyc_7551p_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:epyc_7551p:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:epyc_7552_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:epyc_7601_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:epyc_7601:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:epyc_7642_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:epyc_7662_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:epyc_7702_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:epyc_7742_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:epyc_7f32_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:epyc_7f52_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:epyc_7f72_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:epyc_7h12_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:ryzen_3_2200u_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:ryzen_3_2200u:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:ryzen_3_2300u_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:ryzen_3_2300u:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:ryzen_3_3100_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:ryzen_3_3100:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:ryzen_3_3200u_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:ryzen_3_3200u:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:ryzen_3_3250u_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:ryzen_3_3250u:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:ryzen_3_3300g_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:ryzen_3_3300g:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:ryzen_3_3300u_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:ryzen_3_3300u:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:ryzen_3_3300x_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:ryzen_3_4300g_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:ryzen_3_4300g:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:ryzen_3_4300ge_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:ryzen_3_4300ge:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:ryzen_3_4300u_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:ryzen_3_4300u:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:ryzen_5_2500u_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:ryzen_5_2500u:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:ryzen_5_2600_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:ryzen_5_2600:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:ryzen_5_2600h_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:ryzen_5_2600h:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:ryzen_5_2600x_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:ryzen_5_2600x:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:ryzen_5_2700_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:ryzen_5_2700:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:ryzen_5_2700x_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:ryzen_5_2700x:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:ryzen_5_3400g_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:ryzen_5_3400g:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:ryzen_5_3450g_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:ryzen_5_3450g:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:ryzen_5_3500u_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:ryzen_5_3500u:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:ryzen_5_3550h_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:ryzen_5_3550h:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:ryzen_5_3600_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:ryzen_5_3600:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:ryzen_5_3600x_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:ryzen_5_3600x:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:ryzen_5_3600xt_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:ryzen_5_3600xt:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:ryzen_5_4500u_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:ryzen_5_4500u:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:ryzen_5_4600g_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:ryzen_5_4600g:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:ryzen_5_4600ge_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:ryzen_5_4600ge:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:ryzen_5_4600h_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:ryzen_5_4600h:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:ryzen_5_4600u_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:ryzen_5_4600u:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:ryzen_7_2700_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:ryzen_7_2700:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:ryzen_7_2700u_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:ryzen_7_2700u:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:ryzen_7_2700x_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:ryzen_7_2700x:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:ryzen_7_2800h_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:ryzen_7_2800h:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:ryzen_7_3700u_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:ryzen_7_3700u:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:ryzen_7_3700x_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:ryzen_7_3700x:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:ryzen_7_3750h_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:ryzen_7_3750h:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:ryzen_7_3800x_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:ryzen_7_3800x:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:ryzen_7_3800xt_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:ryzen_7_3800xt:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:ryzen_7_4700g_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:ryzen_7_4700g:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:ryzen_7_4700ge_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:ryzen_7_4700ge:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:ryzen_7_4700u_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:ryzen_7_4700u:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:ryzen_7_4800h_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:ryzen_7_4800h:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:ryzen_7_4800u_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:ryzen_7_4800u:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:ryzen_9_4900h_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:ryzen_9_4900h:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:ryzen_threadripper_2920x_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:ryzen_threadripper_2920x:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:ryzen_threadripper_2950x_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:ryzen_threadripper_2950x:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:ryzen_threadripper_2970wx_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:ryzen_threadripper_2970wx:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:ryzen_threadripper_2990wx_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:ryzen_threadripper_2990wx:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:ryzen_threadripper_3960x_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:ryzen_threadripper_3960x:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:ryzen_threadripper_3970x_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:ryzen_threadripper_3970x:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:ryzen_threadripper_3990x_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:ryzen_threadripper_3990x:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:ryzen_threadripper_pro_3795wx_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:ryzen_threadripper_pro_3795wx:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:ryzen_threadripper_pro_3945wx_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:ryzen_threadripper_pro_3945wx:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:ryzen_threadripper_pro_3955wx_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:ryzen_threadripper_pro_3955wx:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:ryzen_threadripper_pro_3995wx_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:ryzen_threadripper_pro_3995wx:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:ryzen_threadripper_pro_5945wx_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:ryzen_threadripper_pro_5945wx:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:ryzen_threadripper_pro_5955wx_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:ryzen_threadripper_pro_5955wx:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:ryzen_threadripper_pro_5965wx_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:ryzen_threadripper_pro_5965wx:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:ryzen_threadripper_pro_5975wx_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:ryzen_threadripper_pro_5975wx:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">AND
OR
*cpe:2.3:o:amd:ryzen_threadripper_pro_5995wx_firmware:-:*:*:*:*:*:*:*
OR
cpe:2.3:h:amd:ryzen_threadripper_pro_5995wx:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Added</td>
<td
data-testid="vuln-change-history-12-type">CPE Configuration</td>
<td data-testid="vuln-change-history-12-old">
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">OR
*cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
*cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*
*cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*
*cpe:2.3:o:xen:xen:-:*:*:*:*:*:*:*</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Changed</td>
<td
data-testid="vuln-change-history-12-type">Reference Type</td>
<td data-testid="vuln-change-history-12-old">
<pre style="word-break: break-all !important">http://www.openwall.com/lists/oss-security/2022/07/12/2 No Types Assigned</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">http://www.openwall.com/lists/oss-security/2022/07/12/2 Mailing List, Patch, Third Party Advisory</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Changed</td>
<td
data-testid="vuln-change-history-12-type">Reference Type</td>
<td data-testid="vuln-change-history-12-old">
<pre style="word-break: break-all !important">http://www.openwall.com/lists/oss-security/2022/07/12/4 No Types Assigned</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">http://www.openwall.com/lists/oss-security/2022/07/12/4 Mailing List, Third Party Advisory</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Changed</td>
<td
data-testid="vuln-change-history-12-type">Reference Type</td>
<td data-testid="vuln-change-history-12-old">
<pre style="word-break: break-all !important">http://www.openwall.com/lists/oss-security/2022/07/12/5 No Types Assigned</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">http://www.openwall.com/lists/oss-security/2022/07/12/5 Mailing List, Third Party Advisory</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Changed</td>
<td
data-testid="vuln-change-history-12-type">Reference Type</td>
<td data-testid="vuln-change-history-12-old">
<pre style="word-break: break-all !important">http://www.openwall.com/lists/oss-security/2022/07/13/1 No Types Assigned</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">http://www.openwall.com/lists/oss-security/2022/07/13/1 Mailing List, Third Party Advisory</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Changed</td>
<td
data-testid="vuln-change-history-12-type">Reference Type</td>
<td data-testid="vuln-change-history-12-old">
<pre style="word-break: break-all !important">http://xenbits.xen.org/xsa/advisory-407.html No Types Assigned</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">http://xenbits.xen.org/xsa/advisory-407.html Patch, Third Party Advisory</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Changed</td>
<td
data-testid="vuln-change-history-12-type">Reference Type</td>
<td data-testid="vuln-change-history-12-old">
<pre style="word-break: break-all !important">https://comsec.ethz.ch/retbleed No Types Assigned</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">https://comsec.ethz.ch/retbleed Exploit, Third Party Advisory</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Changed</td>
<td
data-testid="vuln-change-history-12-type">Reference Type</td>
<td data-testid="vuln-change-history-12-old">
<pre style="word-break: break-all !important">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D4RW5FCIYFNCQOEFJEUIRW3DGYW7CWBG/ No Types Assigned</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D4RW5FCIYFNCQOEFJEUIRW3DGYW7CWBG/ Mailing List, Third Party Advisory</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Changed</td>
<td
data-testid="vuln-change-history-12-type">Reference Type</td>
<td data-testid="vuln-change-history-12-old">
<pre style="word-break: break-all !important">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KLSRW4LLTAT3CZMOYVNTC7YIYGX3KLED/ No Types Assigned</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KLSRW4LLTAT3CZMOYVNTC7YIYGX3KLED/ Mailing List, Third Party Advisory</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Changed</td>
<td
data-testid="vuln-change-history-12-type">Reference Type</td>
<td data-testid="vuln-change-history-12-old">
<pre style="word-break: break-all !important">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M27MB3QFNIJV4EQQSXWARHP3OGX6CR6K/ No Types Assigned</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M27MB3QFNIJV4EQQSXWARHP3OGX6CR6K/ Mailing List, Third Party Advisory</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-12">
<td
data-testid="vuln-change-history-12-action">Changed</td>
<td
data-testid="vuln-change-history-12-type">Reference Type</td>
<td data-testid="vuln-change-history-12-old">
<pre style="word-break: break-all !important">https://www.debian.org/security/2022/dsa-5184 No Types Assigned</pre>
<br/>
<br/>
</td>
<td data-testid="vuln-change-history-12-new">
<pre style="word-break: break-all !important">https://www.debian.org/security/2022/dsa-5184 Third Party Advisory</pre>
<br/>
<br />
</td>
</tr>
</tbody>
</table>
</div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-13">CVE Modified by Switzerland Government Common Vulnerability Program</span> <span
data-testid="vuln-change-history-date-13">7/18/2022 12:15:09 AM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-change-history-13">
<td
data-testid="vuln-change-history-13-action">Added</td>
<td
data-testid="vuln-change-history-13-type">Reference</td>
<td data-testid="vuln-change-history-13-old">
</td>
<td data-testid="vuln-change-history-13-new">
<pre style="word-break: break-all !important">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KLSRW4LLTAT3CZMOYVNTC7YIYGX3KLED/ [No Types Assigned]</pre>
<br/>
<br />
</td>
</tr>
</tbody>
</table>
</div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-14">CVE Modified by Switzerland Government Common Vulnerability Program</span> <span
data-testid="vuln-change-history-date-14">7/15/2022 11:15:09 PM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-change-history-14">
<td
data-testid="vuln-change-history-14-action">Added</td>
<td
data-testid="vuln-change-history-14-type">Reference</td>
<td data-testid="vuln-change-history-14-old">
</td>
<td data-testid="vuln-change-history-14-new">
<pre style="word-break: break-all !important">https://www.debian.org/security/2022/dsa-5184 [No Types Assigned]</pre>
<br/>
<br />
</td>
</tr>
</tbody>
</table>
</div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-15">CVE Modified by Switzerland Government Common Vulnerability Program</span> <span
data-testid="vuln-change-history-date-15">7/15/2022 12:15:11 AM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-change-history-15">
<td
data-testid="vuln-change-history-15-action">Added</td>
<td
data-testid="vuln-change-history-15-type">Reference</td>
<td data-testid="vuln-change-history-15-old">
</td>
<td data-testid="vuln-change-history-15-new">
<pre style="word-break: break-all !important">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D4RW5FCIYFNCQOEFJEUIRW3DGYW7CWBG/ [No Types Assigned]</pre>
<br/>
<br />
</td>
</tr>
</tbody>
</table>
</div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-16">CVE Modified by Switzerland Government Common Vulnerability Program</span> <span
data-testid="vuln-change-history-date-16">7/14/2022 12:15:11 AM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-change-history-16">
<td
data-testid="vuln-change-history-16-action">Added</td>
<td
data-testid="vuln-change-history-16-type">Reference</td>
<td data-testid="vuln-change-history-16-old">
</td>
<td data-testid="vuln-change-history-16-new">
<pre style="word-break: break-all !important">https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M27MB3QFNIJV4EQQSXWARHP3OGX6CR6K/ [No Types Assigned]</pre>
<br/>
<br />
</td>
</tr>
</tbody>
</table>
</div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-17">CVE Modified by Switzerland Government Common Vulnerability Program</span> <span
data-testid="vuln-change-history-date-17">7/13/2022 2:15:08 PM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-change-history-17">
<td
data-testid="vuln-change-history-17-action">Added</td>
<td
data-testid="vuln-change-history-17-type">Reference</td>
<td data-testid="vuln-change-history-17-old">
</td>
<td data-testid="vuln-change-history-17-new">
<pre style="word-break: break-all !important">http://www.openwall.com/lists/oss-security/2022/07/13/1 [No Types Assigned]</pre>
<br/>
<br />
</td>
</tr>
</tbody>
</table>
</div>
<div class="vuln-change-history-container"
style="display:none">
<h4>
<strong><span
data-testid="vuln-change-history-type-18">CVE Modified by Switzerland Government Common Vulnerability Program</span> <span
data-testid="vuln-change-history-date-18">7/12/2022 5:15:09 PM</span></strong>
</h4>
<table
class="table table-striped table-condensed table-bordered detail-table"
data-testid="vuln-change-history-table">
<thead>
<tr>
<th>Action</th>
<th>Type</th>
<th>Old Value</th>
<th>New Value</th>
</tr>
</thead>
<tbody>
<tr data-testid="vuln-change-history-18">
<td
data-testid="vuln-change-history-18-action">Added</td>
<td
data-testid="vuln-change-history-18-type">Reference</td>
<td data-testid="vuln-change-history-18-old">
</td>
<td data-testid="vuln-change-history-18-new">
<pre style="word-break: break-all !important">http://www.openwall.com/lists/oss-security/2022/07/12/4 [No Types Assigned]</pre>
<br/>
<br />
</td>
</tr>
<tr data-testid="vuln-change-history-18">
<td
data-testid="vuln-change-history-18-action">Added</td>
<td
data-testid="vuln-change-history-18-type">Reference</td>
<td data-testid="vuln-change-history-18-old">
</td>
<td data-testid="vuln-change-history-18-new">
<pre style="word-break: break-all !important">http://www.openwall.com/lists/oss-security/2022/07/12/5 [No Types Assigned]</pre>
<br/>
<br />
</td>
</tr>
</tbody>
</table>
</div>
</div>
</div>
</div>
</div>
<div class="col-lg-3 col-md-5 col-sm-12">
<div class="bs-callout bs-callout-info">
<h4>Quick Info</h4>
<strong>CVE Dictionary Entry:</strong><br/> <a
target="_blank" rel="noopener noreferrer" data-testid="vuln-cve-dictionary-entry"
href="https://cve.org/CVERecord?id=CVE-2022-29900">CVE-2022-29900</a><br/> <strong>NVD
Published Date:</strong><br/> <span
data-testid="vuln-published-on">07/12/2022</span><br/> <strong>NVD
Last Modified:</strong><br/> <span
data-testid="vuln-last-modified-on">11/21/2024</span><br/> <strong>
Source:</strong><br/> <span
data-testid="vuln-current-description-source">Advanced Micro Devices Inc.</span><br/>
</div>
</div>
</div>
</td>
</tr>
</table>
</div>
<!-- Hidden input for padding -->
<input type="hidden" value="MKvoLmL3mkjWMRGxF5a7d2oydZZ5v60g4dQB1xsZrnP1CXmT9qZTrdNGuvGZA8cyJCr3cjfz07jEdyce3qCTZLNdkNlQULycVMTSBpmTnOMXrgrnehwev5ktQDCtNIn0CjgKCOgi6tTOm4aaOa0h6CsRpr5qmsmOPThRd2dbeYgZ6CPvnYPguTmZh2Dey9NvGzmR9hHT8fv0Wj9fi5YL47DMfDcv3FskmKj26zGkzV4y45qLxfJV718alwHn81mUlt4o3t5n1BpKVRW1Z2sDrnaFKNpTPSzhU5TNxLEx0HRok5akdYcYebjmEfvdA2Sn5ZKFRAMsjAmqO8eSmyZ9Wu" id="padding" name="padding"/>
</div>
</div>
</div>
</main>
<footer id="footer" role="contentinfo">
<div class="container">
<div class="row">
<div class="col-sm-12">
<ul class="social-list pull-right">
<li class="field-item service-twitter list-horiz"><a
href="https://twitter.com/NISTCyber" target="_blank" rel="noopener noreferrer"
class="social-btn social-btn--large extlink ext"> <i
class="fa fa-twitter fa-fw"><span class="element-invisible">twitter</span></i><span
class="ext"><span class="element-invisible"> (link
is external)</span></span>
</a></li>
<li class="field-item service-facebook list-horiz"><a
href="https://www.facebook.com/NIST" target="_blank" rel="noopener noreferrer"
class="social-btn social-btn--large extlink ext"> <i
class="fa fa-facebook fa-fw"><span class="element-invisible">facebook</span></i><span
class="ext"><span class="element-invisible"> (link
is external)</span></span></a></li>
<li class="field-item service-linkedin list-horiz"><a
href="https://www.linkedin.com/company/nist" target="_blank" rel="noopener noreferrer"
class="social-btn social-btn--large extlink ext"> <i
class="fa fa-linkedin fa-fw"><span class="element-invisible">linkedin</span></i><span
class="ext"><span class="element-invisible"> (link
is external)</span></span></a></li>
<li class="field-item service-youtube list-horiz"><a
href="https://www.youtube.com/user/USNISTGOV" target="_blank" rel="noopener noreferrer"
class="social-btn social-btn--large extlink ext"> <i
class="fa fa-youtube fa-fw"><span class="element-invisible">youtube</span></i><span
class="ext"><span class="element-invisible"> (link
is external)</span></span></a></li>
<li class="field-item service-rss list-horiz"><a
href="https://www.nist.gov/news-events/nist-rss-feeds"
target="_blank" rel="noopener noreferrer" class="social-btn social-btn--large extlink">
<i class="fa fa-rss fa-fw"><span class="element-invisible">rss</span></i>
</a></li>
<li class="field-item service-govdelivery list-horiz last"><a
href="https://public.govdelivery.com/accounts/USNIST/subscriber/new?qsp=USNIST_3"
target="_blank" rel="noopener noreferrer" class="social-btn social-btn--large extlink ext">
<i class="fa fa-envelope fa-fw"><span
class="element-invisible">govdelivery</span></i><span class="ext"><span
class="element-invisible"> (link is external)</span></span>
</a></li>
</ul>
<span class="hidden-xs"> <a
title="National Institute of Standards and Technology" rel="home"
class="footer-nist-logo"> <img
src="/site-media/images/nist/nist-logo.png"
alt="National Institute of Standards and Technology logo" />
</a>
</span>
</div>
</div>
<div class="row hidden-sm hidden-md hidden-lg">
<div class="col-sm-12">
<a href="https://www.nist.gov"
title="National Institute of Standards and Technology" rel="home"
target="_blank" rel="noopener noreferrer" class="footer-nist-logo"> <img
src="/site-media/images/nist/nist-logo.png"
alt="National Institute of Standards and Technology logo" />
</a>
</div>
</div>
<div class="row footer-contact-container">
<div class="col-sm-6">
<strong>HEADQUARTERS</strong>
<br>
100 Bureau Drive
<br>
Gaithersburg, MD 20899
<br>
<a href="tel:301-975-2000">(301) 975-2000</a>
<br>
<br>
<a href="mailto:nvd@nist.gov">Webmaster</a> | <a
href="https://www.nist.gov/about-nist/contact-us">Contact Us</a>
| <a href="https://www.nist.gov/about-nist/visit"
style="display: inline-block;">Our Other Offices</a>
</div>
<div class="col-sm-6">
<div class="pull-right"
style="text-align:right">
<strong>Incident Response Assistance and Non-NVD Related<br>Technical Cyber Security Questions:</strong>
<br>
US-CERT Security Operations Center
<br> Email: <a href="mailto:soc@us-cert.gov">soc@us-cert.gov</a>
<br> Phone: 1-888-282-0870
</div>
</div>
</div>
<div class="row">
<nav title="Footer Navigation" role="navigation"
class="row footer-bottom-links-container">
<!-- https://github.com/usnistgov/nist-header-footer/blob/nist-pages/boilerplate-footer.html -->
<p>
<a href="https://www.nist.gov/oism/site-privacy">Site Privacy</a>
|
<a href="https://www.nist.gov/oism/accessibility">Accessibility</a>
|
<a href="https://www.nist.gov/privacy">Privacy Program</a>
|
<a href="https://www.nist.gov/oism/copyrights">Copyrights</a>
|
<a href="https://www.commerce.gov/vulnerability-disclosure-policy">Vulnerability Disclosure</a>
|
<a href="https://www.nist.gov/no-fear-act-policy">No Fear Act Policy</a>
|
<a href="https://www.nist.gov/foia">FOIA</a>
|
<a href="https://www.nist.gov/environmental-policy-statement">Environmental Policy</a>
|
<a href="https://www.nist.gov/summary-report-scientific-integrity">Scientific Integrity</a>
|
<a href="https://www.nist.gov/nist-information-quality-standards">Information Quality Standards</a>
|
<a href="https://www.commerce.gov/">Commerce.gov</a>
|
<a href="https://www.science.gov/">Science.gov</a>
|
<a href="https://www.usa.gov/">USA.gov</a>
</p>
</nav>
</div>
</div>
</footer>
</body>
</html>