8342 lines
815 KiB
Text
8342 lines
815 KiB
Text
<!DOCTYPE html>
|
||
|
||
<html lang="en">
|
||
<head>
|
||
|
||
|
||
|
||
<title>NVD - CVE-2022-38083</title>
|
||
|
||
<meta http-equiv="content-type" content="text/html; charset=UTF-8" />
|
||
<meta http-equiv="content-style-type" content="text/css" />
|
||
<meta http-equiv="content-script-type" content="text/javascript" />
|
||
<meta name="viewport" content="width=device-width, initial-scale=1.0" />
|
||
|
||
|
||
<link href="/site-scripts/font-awesome/css/font-awesome.min.css"
|
||
type="text/css" rel="stylesheet" />
|
||
<link href="/site-media/bootstrap/css/bootstrap.min.css"
|
||
type="text/css" rel="stylesheet" />
|
||
<link href="/site-media/bootstrap/css/bootstrap-theme.min.css"
|
||
type="text/css" rel="stylesheet" />
|
||
<link
|
||
href="/site-scripts/eonasdan-bootstrap-datetimepicker/build/css/bootstrap-datetimepicker.min.css"
|
||
type="text/css" rel="stylesheet" />
|
||
|
||
|
||
<link href="/site-media/css/nist-fonts.css" type="text/css"
|
||
rel="stylesheet" />
|
||
<link href="/site-media/css/base-style.css" type="text/css"
|
||
rel="stylesheet" />
|
||
<link href="/site-media/css/media-resize.css" type="text/css"
|
||
rel="stylesheet" />
|
||
|
||
|
||
<meta name="theme-color" content="#000000">
|
||
|
||
|
||
<script src="/site-scripts/jquery/dist/jquery.min.js"
|
||
type="text/javascript"></script>
|
||
<script src="/site-scripts/jquery-visible/jquery.visible.min.js"
|
||
type="text/javascript"></script>
|
||
<script src="/site-scripts/underscore/underscore-min.js"
|
||
type="text/javascript"></script>
|
||
<script src="/site-media/bootstrap/js/bootstrap.js"
|
||
type="text/javascript"></script>
|
||
<script src="/site-scripts/moment/min/moment.min.js"
|
||
type="text/javascript"></script>
|
||
<script
|
||
src="/site-scripts/eonasdan-bootstrap-datetimepicker/build/js/bootstrap-datetimepicker.min.js"
|
||
type="text/javascript"></script>
|
||
|
||
|
||
<script src="/site-media/js/megamenu.js" type="text/javascript"></script>
|
||
<script src="/site-media/js/nist-exit-script.js"
|
||
type="text/javascript"></script>
|
||
<script src="/site-media/js/forms.js" type="text/javascript"></script>
|
||
|
||
<script
|
||
src="/site-media/js/federated-analytics.all.min.js?agency=NIST&subagency=nvd&pua=UA-37115410-41&yt=true"
|
||
type="text/javascript" id="_fed_an_js_tag"></script>
|
||
|
||
<!-- Google tag (gtag.js) -->
|
||
<script async src="https://www.googletagmanager.com/gtag/js?id=G-4KKFZP12LQ"></script>
|
||
<script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-4KKFZP12LQ'); </script>
|
||
|
||
|
||
<style id="antiClickjack">
|
||
body>* {
|
||
display: none !important;
|
||
}
|
||
|
||
#antiClickjack {
|
||
display: block !important;
|
||
}
|
||
</style>
|
||
<noscript>
|
||
<style id="antiClickjackNoScript">
|
||
body>* {
|
||
display: block !important;
|
||
}
|
||
|
||
#antiClickjack {
|
||
display: none !important;
|
||
}
|
||
</style>
|
||
</noscript>
|
||
<script type="text/javascript" id="antiClickjackScript">
|
||
if (self === top) {
|
||
// no clickjacking
|
||
var antiClickjack = document.getElementById("antiClickjack");
|
||
antiClickjack.parentNode.removeChild(antiClickjack);
|
||
} else {
|
||
setTimeout(tryForward(), 5000);
|
||
}
|
||
|
||
function tryForward() {
|
||
top.location = self.location;
|
||
}
|
||
</script>
|
||
<meta charset="UTF-8">
|
||
|
||
<link href="/site-media/css/nvd-style.css" type="text/css"
|
||
rel="stylesheet" />
|
||
<link href="/site-media/images/favicons/apple-touch-icon.png"
|
||
rel="apple-touch-icon" type="image/png" sizes="180x180" />
|
||
<link href="/site-media/images/favicons/favicon-32x32.png"
|
||
rel="icon" type="image/png" sizes="32x32" />
|
||
<link href="/site-media/images/favicons/favicon-16x16.png"
|
||
rel="icon" type="image/png" sizes="16x16" />
|
||
<link href="/site-media/images/favicons/manifest.json"
|
||
rel="manifest" />
|
||
<link href="/site-media/images/favicons/safari-pinned-tab.svg"
|
||
rel="mask-icon" color="#000000" />
|
||
<link href="/site-media/images/favicons/favicon.ico"
|
||
rel="shortcut icon" />
|
||
<meta name="msapplication-config" content="/site-media/images/favicons/browserconfig.xml" />
|
||
<link href="/site-media/images/favicons/favicon.ico"
|
||
rel="shortcut icon" type="image/x-icon" />
|
||
<link href="/site-media/images/favicons/favicon.ico" rel="icon"
|
||
type="image/x-icon" />
|
||
<meta charset="UTF-8">
|
||
<script src="/site-media/js/vulnerability/vulnDetail.js"
|
||
type="text/javascript"></script>
|
||
<script src="/site-media/js/vulnerability/cvssVulnDetail.js"
|
||
type="text/javascript"></script>
|
||
|
||
</head>
|
||
<body>
|
||
<header role="banner" title="Site Banner">
|
||
<div id="antiClickjack" style="display: none">
|
||
<h1>You are viewing this page in an unauthorized frame window.</h1>
|
||
<p>
|
||
This is a potential security issue, you are being redirected to
|
||
<a href="https://nvd.nist.gov">https://nvd.nist.gov</a>
|
||
</p>
|
||
</div>
|
||
<div>
|
||
<section class="usa-banner" aria-label="Official government website">
|
||
<div class="usa-accordion container">
|
||
<header class="usa-banner__header">
|
||
<noscript>
|
||
<p style="font-size: 0.85rem; font-weight: bold;">You have JavaScript disabled. This site requires JavaScript to be enabled for complete site functionality.</p>
|
||
</noscript>
|
||
<img class="usa-banner__header-flag"
|
||
src="/site-media/images/usbanner/us_flag_small.png" alt="U.S. flag">
|
||
|
||
<span class="usa-banner__header-text">An official website of the United States government</span>
|
||
|
||
<button id="gov-banner-button" class="usa-accordion__button usa-banner__button" data-toggle="collapse" data-target="#gov-banner" aria-expanded="false" aria-controls="gov-banner">
|
||
<span class="usa-banner__button-text">Here's how you know</span>
|
||
</button>
|
||
</header>
|
||
<div class="usa-banner__content usa-accordion__content collapse" role="tabpanel" id="gov-banner" aria-expanded="true">
|
||
<div class="row">
|
||
<div class="col-md-5 col-sm-12">
|
||
<div class="row">
|
||
<div class="col-sm-2 col-xs-3">
|
||
<img class="usa-banner__icon usa-media-block__img"
|
||
src="/site-media/images/usbanner/icon-dot-gov.svg" alt="Dot gov">
|
||
</div>
|
||
<div class="col-sm-10 col-xs-9">
|
||
<p>
|
||
<strong>Official websites use .gov</strong>
|
||
<br>
|
||
A <strong>.gov</strong> website belongs to an official government organization in the United States.
|
||
</p>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
<div class="col-md-5 col-sm-12">
|
||
<div class="row">
|
||
<div class="col-sm-2 col-xs-3">
|
||
<img class="usa-banner__icon usa-media-block__img"
|
||
src="/site-media/images/usbanner/icon-https.svg" alt="Https">
|
||
</div>
|
||
<div class="col-sm-10 col-xs-9">
|
||
<p>
|
||
<strong>Secure .gov websites use HTTPS</strong>
|
||
<br>
|
||
A <strong>lock</strong> (<img class="usa-banner__lock"
|
||
src="/site-media/images/usbanner/lock.svg" alt="Dot gov">) or <strong>https://</strong> means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.
|
||
</p>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
</section>
|
||
</div>
|
||
<div>
|
||
<div>
|
||
<nav id="navbar" class="navbar">
|
||
<div id="nist-menu-container" class="container">
|
||
<div class="row">
|
||
<!-- Brand -->
|
||
<div class="col-xs-6 col-md-4 navbar-header"
|
||
style="height:104px">
|
||
<a class="navbar-brand"
|
||
href="https://www.nist.gov"
|
||
target="_blank" rel="noopener noreferrer"
|
||
id="navbar-brand-image"
|
||
style="padding-top: 36px">
|
||
|
||
<img alt="National Institute of Standards and Technology"
|
||
src="/site-media/images/nist/nist-logo.svg"
|
||
width="110" height="30">
|
||
</a>
|
||
</div>
|
||
<div class="col-xs-6 col-md-8 navbar-nist-logo">
|
||
<span id="nvd-menu-button" class="pull-right" style="margin-top: 26px"> <a href="#">
|
||
<span class="fa fa-bars"></span> <span id="nvd-menu-full-text"><span
|
||
class="hidden-xxs">NVD </span>MENU</span>
|
||
</a>
|
||
</span>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
|
||
<div class="main-menu-row container">
|
||
<!-- Collect the nav links, forms, and other content for toggling -->
|
||
<div id="main-menu-drop" class="col-lg-12" style="display: none;">
|
||
<ul>
|
||
|
||
<li><a href="/general"> General <span
|
||
class="expander fa fa-plus" id="nvd-header-menu-general"
|
||
data-expander-name="general" data-expanded="false"> <span
|
||
class="element-invisible">Expand or Collapse</span>
|
||
</span>
|
||
</a>
|
||
<div style="display: none;" class="sub-menu"
|
||
data-expander-trigger="general">
|
||
<div class="row">
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/general/nvd-dashboard">NVD Dashboard</a>
|
||
</p>
|
||
<p>
|
||
<a href="https://www.nist.gov/itl/nvd">News and Status Updates</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/general/faq">FAQ</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/general/visualizations">Visualizations</a>
|
||
</p>
|
||
<p>
|
||
<a href="/general/legal-disclaimer">Legal Disclaimer</a>
|
||
</p>
|
||
</div>
|
||
</div>
|
||
</div></li>
|
||
<li><a href="/vuln"> Vulnerabilities <span
|
||
class="expander fa fa-plus"
|
||
id="nvd-header-menu-vulnerabilities"
|
||
data-expander-name="vulnerabilities" data-expanded="false">
|
||
<span class="element-invisible">Expand or Collapse</span>
|
||
</span>
|
||
</a>
|
||
<div style="display: none;" class="sub-menu"
|
||
data-expander-trigger="vulnerabilities">
|
||
<div class="row">
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/vuln/search">Search & Statistics</a>
|
||
</p>
|
||
<p>
|
||
<a href="/vuln/categories">Weakness Types</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/vuln/data-feeds">Legacy Data Feeds</a>
|
||
</p>
|
||
<p>
|
||
<a href="/vuln/vendor-comments">Vendor Comments</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/vuln/cvmap">CVMAP</a>
|
||
</p>
|
||
</div>
|
||
</div>
|
||
</div></li>
|
||
<li><a href="/vuln-metrics/cvss#"> Vulnerability Metrics <span
|
||
class="expander fa fa-plus" id="nvd-header-menu-metrics"
|
||
data-expander-name="metrics" data-expanded="false"> <span
|
||
class="element-invisible">Expand or Collapse</span>
|
||
</span>
|
||
</a>
|
||
<div style="display: none;" class="sub-menu"
|
||
data-expander-trigger="metrics">
|
||
<div class="row">
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/vuln-metrics/cvss/v4-calculator">CVSS v4.0
|
||
Calculators</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/vuln-metrics/cvss/v3-calculator">CVSS v3.x
|
||
Calculators</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/vuln-metrics/cvss/v2-calculator">CVSS v2.0
|
||
Calculator</a>
|
||
</p>
|
||
|
||
</div>
|
||
</div>
|
||
</div></li>
|
||
<li><a href="/products"> Products <span
|
||
class="expander fa fa-plus" id="nvd-header-menu-products"
|
||
data-expander-name="products" data-expanded="false"> <span
|
||
class="element-invisible">Expand or Collapse</span>
|
||
</span>
|
||
</a>
|
||
<div style="display: none;" class="sub-menu"
|
||
data-expander-trigger="products">
|
||
<div class="row">
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/products/cpe">CPE Dictionary</a>
|
||
</p>
|
||
<p>
|
||
<a href="/products/cpe/search">CPE Search</a>
|
||
</p>
|
||
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/products/cpe/statistics">CPE Statistics</a>
|
||
</p>
|
||
<p>
|
||
<a href="/products/swid">SWID</a>
|
||
</p>
|
||
|
||
</div>
|
||
<div class="col-lg-4"></div>
|
||
</div>
|
||
</div></li>
|
||
<li>
|
||
<a href="/developers">Developers<span
|
||
class="expander fa fa-plus" id="nvd-header-menu-developers"
|
||
data-expander-name="developers" data-expanded="false"> <span
|
||
class="element-invisible">Expand or Collapse</span>
|
||
</span>
|
||
</a>
|
||
<div style="display: none;" class="sub-menu"
|
||
data-expander-trigger="developers">
|
||
<div class="row">
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/developers/start-here">Start Here</a>
|
||
</p>
|
||
<p>
|
||
<a href="/developers/request-an-api-key">Request an API Key</a>
|
||
</p>
|
||
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/developers/vulnerabilities">Vulnerabilities</a>
|
||
</p>
|
||
<p>
|
||
<a href="/developers/products">Products</a>
|
||
</p>
|
||
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/developers/data-sources">Data Sources</a>
|
||
</p>
|
||
<p>
|
||
<a href="/developers/terms-of-use">Terms of Use</a>
|
||
</p>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
</li>
|
||
<li><a href="/contact"> Contact NVD </a></li>
|
||
<li><a href="/other"> Other Sites <span
|
||
class="expander fa fa-plus" id="nvd-header-menu-othersites"
|
||
data-expander-name="otherSites" data-expanded="false"> <span
|
||
class="element-invisible">Expand or Collapse</span>
|
||
</span>
|
||
</a>
|
||
<div style="display: none;" class="sub-menu"
|
||
data-expander-trigger="otherSites">
|
||
<div class="row">
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="https://ncp.nist.gov">Checklist (NCP) Repository</a>
|
||
</p>
|
||
<p>
|
||
<a href="https://ncp.nist.gov/cce">Configurations (CCE)</a>
|
||
</p>
|
||
<p>
|
||
<a href="https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search">800-53 Controls</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a
|
||
href="https://csrc.nist.gov/projects/scap-validation-program">SCAP
|
||
Validated Tools</a>
|
||
</p>
|
||
<p>
|
||
<a
|
||
href="https://csrc.nist.gov/projects/security-content-automation-protocol">SCAP</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a
|
||
href="https://csrc.nist.gov/projects/united-states-government-configuration-baseline">USGCB</a>
|
||
</p>
|
||
</div>
|
||
</div>
|
||
</div></li>
|
||
|
||
<li><a href="/search"> Search <span
|
||
class="expander fa fa-plus" id="nvd-header-menu-search"
|
||
data-expander-name="search" data-expanded="false"> <span
|
||
class="element-invisible">Expand or Collapse</span>
|
||
</span>
|
||
</a>
|
||
<div style="display: none;" class="sub-menu"
|
||
data-expander-trigger="search">
|
||
<div class="row">
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/vuln/search">Vulnerability Search</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/products/cpe/search">CPE Search</a>
|
||
</p>
|
||
</div>
|
||
</div>
|
||
</div></li>
|
||
|
||
|
||
|
||
|
||
</ul>
|
||
</div>
|
||
<!-- /#mobile-nav-container -->
|
||
</div>
|
||
|
||
</nav>
|
||
<section id="itl-header" class="has-menu">
|
||
<div class="container">
|
||
<div class="row">
|
||
<div class="col-sm-12 col-md-8">
|
||
<h2 class="hidden-xs hidden-sm">
|
||
<a href="https://www.nist.gov/itl" target="_blank" rel="noopener noreferrer">Information Technology Laboratory</a>
|
||
</h2>
|
||
<h1 class="hidden-xs hidden-sm">
|
||
<a id="nvd-header-link"
|
||
href="/">National Vulnerability Database</a>
|
||
</h1>
|
||
<h1 class="hidden-xs text-center hidden-md hidden-lg"
|
||
>National Vulnerability Database</h1>
|
||
<h1 class="hidden-sm hidden-md hidden-lg text-center"
|
||
>NVD</h1>
|
||
|
||
</div>
|
||
<div class="col-sm-12 col-md-4">
|
||
<a style="width: 100%; text-align: center; display: block;padding-top: 14px">
|
||
<img id="img-logo-nvd-lg"
|
||
alt="National Vulnerability Database"
|
||
src="/site-media/images/F_NIST-Logo-NVD-white.svg"
|
||
width="500" height="100">
|
||
</a>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
</section>
|
||
|
||
|
||
</div>
|
||
</div>
|
||
</header>
|
||
<main>
|
||
<div>
|
||
<div id="body-section" class="container">
|
||
<div class="row">
|
||
<ol class="breadcrumb">
|
||
<li><a href="/vuln" class="CMSBreadCrumbsLink">Vulnerabilities</a></li>
|
||
</ol>
|
||
</div>
|
||
<div>
|
||
<style>
|
||
/* wrap the words for CVSS v4 */
|
||
#nistv4Metric {
|
||
word-wrap: break-word;
|
||
}
|
||
</style>
|
||
|
||
<script>
|
||
/*<![CDATA[*/
|
||
var vuln = {
|
||
nistV4Present: false,
|
||
cnaV4Present: false,
|
||
nistV3Present: true,
|
||
cnaV3Present: true,
|
||
nistV2Present: false,
|
||
cnaV2Present: false
|
||
};
|
||
/*]]>*/
|
||
</script>
|
||
|
||
|
||
<div>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
|
||
|
||
|
||
<div id="vulnDetailPanel">
|
||
<table id="vulnDetailTableView" style="border-collapse: collapse;">
|
||
<tr>
|
||
<td colspan="2">
|
||
|
||
<h2 data-testid="page-header">
|
||
<i class="fa fa-bug fa-flip-vertical"></i><span
|
||
data-testid="page-header-vuln-id">CVE-2022-38083</span>
|
||
Detail
|
||
</h2>
|
||
|
||
|
||
|
||
<div class="row">
|
||
<div class="col-lg-9 col-md-7 col-sm-12">
|
||
<div id="vulnShowWarningDiv"
|
||
data-testid="vuln-warning-container">
|
||
<div
|
||
role="alert" data-testid="vuln-warning-alert-container" class="bs-callout bs-callout-info">
|
||
<strong class="h4Size"><span
|
||
data-testid="vuln-warning-status-name">Modified</span></strong>
|
||
<hr/>
|
||
<p data-testid="vuln-warning-banner-content">This CVE record has been updated after NVD enrichment efforts were completed. Enrichment data supplied by the NVD may require amendment due to these changes.</p>
|
||
</div>
|
||
</div>
|
||
|
||
<h3 id="vulnDescriptionTitle"
|
||
data-testid="vuln-description-title">Description </h3>
|
||
|
||
<p data-testid="vuln-description">Improper initialization in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable information disclosure via local access.</p><br/>
|
||
|
||
|
||
|
||
|
||
|
||
<!-- CVSS Severity and Vector Strings -->
|
||
<div id="vulnCvssPanel" data-testid="vuln-cvss-container"
|
||
class="row bs-callout bs-callout-success cvssVulnDetail">
|
||
<h3 style="display: inline" title="CVSS is not a measure of risk">Metrics</h3>
|
||
 
|
||
<div id="cvssVulnDetailBtn" class="btn-group">
|
||
<button id="btn-cvss4" type="button" title="Click here to view CVSS 4.0 data"
|
||
class="btn default btn-lg cvssBtn">CVSS Version 4.0
|
||
</button>
|
||
<button id="btn-cvss3" type="button" title="Click here to view CVSS 3.x data"
|
||
class="btn default btn-lg cvssBtn">CVSS Version 3.x
|
||
</button>
|
||
<button id="btn-cvss2" type="button" title="Click here to view CVSS 2.0 data"
|
||
class="btn default btn-lg cvssBtn">CVSS Version 2.0
|
||
</button>
|
||
</div>
|
||
|
||
|
||
<div id="cvssEnrichmentNotes">
|
||
<i>
|
||
<small>
|
||
NVD enrichment efforts reference publicly available information to associate
|
||
vector strings. CVSS information contributed by other sources is also
|
||
displayed.
|
||
</small>
|
||
</i>
|
||
</div>
|
||
|
||
<!-- CVSS v4.0 -->
|
||
<div class="container-fluid" id="Vuln4CvssPanel" data-testid="vuln-cvss4-panel">
|
||
<strong>CVSS 4.0 Severity and Vector Strings:</strong>
|
||
<!-- NIST -->
|
||
<div class="row no-gutters">
|
||
<br/>
|
||
<div class="col-lg-3 col-sm-6">
|
||
<div class="row">
|
||
<div class="col-lg-3 col-sm-6">
|
||
<img
|
||
src="/site-media/images/NVD_NVD_Stack_Plain.svg"
|
||
class="cvssNvdIcon" alt="NIST CVSS score">
|
||
</div>
|
||
<div class="col-lg-9 col-sm-6">
|
||
<strong>NIST:</strong> <span class="wrapData"
|
||
data-testid="vuln-cvss4-source-nvd">NVD</span>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
<div class="col-lg-3 col-sm-6">
|
||
<span><strong> </strong><span
|
||
class="severityDetail"> <a
|
||
id="Cvss4NistCalculatorAnchorNA"
|
||
class="label label-default"
|
||
data-testid="vuln-cvss4-panel-score-na">N/A</a></span></span>
|
||
</div>
|
||
<div class="col-lg-6 col-sm-12">
|
||
|
||
<span> <span
|
||
data-testid="vuln-cvss4-nist-vector-na">NVD assessment
|
||
not yet provided.</span></span> <input type="hidden"
|
||
id="nistV4MetricHidden"
|
||
value=""/>
|
||
</div>
|
||
</div>
|
||
<!-- CNA -->
|
||
|
||
|
||
<!-- ADP -->
|
||
|
||
|
||
|
||
|
||
</div>
|
||
|
||
|
||
<!-- CVSS V3.x -->
|
||
<div class="container-fluid" id="Vuln3CvssPanel" data-testid="vuln-cvss3-panel"
|
||
style="display: none;">
|
||
<strong>CVSS 3.x Severity and Vector Strings:</strong>
|
||
<!-- NIST -->
|
||
<div class="row no-gutters">
|
||
<br/>
|
||
|
||
<div class="col-lg-3 col-sm-6">
|
||
<div class="row">
|
||
<div class="col-lg-3 col-sm-6">
|
||
<img
|
||
src="/site-media/images/NVD_NVD_Stack_Plain.svg"
|
||
class="cvssNvdIcon" alt="NIST CVSS score">
|
||
|
||
|
||
</div>
|
||
<div class="col-lg-9 col-sm-6">
|
||
<strong>NIST:</strong> <span class="wrapData"
|
||
data-testid="vuln-cvss3-source-nvd">NVD</span>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
<div class="col-lg-3 col-sm-6">
|
||
<span><strong>Base
|
||
Score:</strong> <span class="severityDetail"> <a
|
||
id="Cvss3NistCalculatorAnchor"
|
||
href="/vuln-metrics/cvss/v3-calculator?name=CVE-2022-38083&vector=AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N&version=3.1&source=NIST"
|
||
data-testid="vuln-cvss3-panel-score"
|
||
class="label label-warning">4.4 MEDIUM</a>
|
||
</span></span>
|
||
|
||
</div>
|
||
<div class="col-lg-6 col-sm-12">
|
||
<span><strong>Vector:</strong>
|
||
<span data-testid="vuln-cvss3-nist-vector"
|
||
class="tooltipCvss3NistMetrics">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N</span></span>
|
||
<input type="hidden"
|
||
id="nistV3MetricHidden"
|
||
value="<span id = 'nistV3Metric' style = 'display:none' > <strong style ='font-size:1.2em' > CVSS v3.1 Severity and Metrics:</strong> <p data-testid='vuln-cvssv3-score-container'> <strong>Base Score: </strong> <span data-testid='vuln-cvssv3-base-score'>4.4 </span><span data-testid='vuln-cvssv3-base-score-severity'>MEDIUM</span> <br /> <strong>Vector: </strong> <span data-testid='vuln-cvssv3-vector'> AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N </span> <br /> <strong>Impact Score: </strong> <span data-testid='vuln-cvssv3-impact-score'> 3.6 </span> <br /> <strong>Exploitability Score: </strong> <span data-testid='vuln-cvssv3-exploitability-score'> 0.8 </span> </p> <hr /> <p data-testid='vuln-cvssv3-metrics-container'> <strong>Attack Vector (AV): </strong> <span data-testid='vuln-cvssv3-av'> Local </span> <br /> <strong>Attack Complexity (AC): </strong> <span data-testid='vuln-cvssv3-ac'> Low </span> <br /> <strong>Privileges Required (PR): </strong> <span data-testid='vuln-cvssv3-pr'> High </span> <br /> <strong>User Interaction (UI): </strong> <span data-testid='vuln-cvssv3-ui'> None </span> <br /> <strong>Scope (S): </strong> <span data-testid='vuln-cvssv3-s'> Unchanged </span> <br /> <strong>Confidentiality (C): </strong> <span data-testid='vuln-cvssv3-c'> High </span> <br /> <strong>Integrity (I): </strong> <span data-testid='vuln-cvssv3-i'> None </span> <br /> <strong>Availability (A): </strong> <span data-testid='vuln-cvssv3-a'> None </span> </p> </span> "/>
|
||
|
||
</div>
|
||
|
||
|
||
</div>
|
||
<!-- CNA -->
|
||
<div class="row no-gutters">
|
||
|
||
<br/>
|
||
<div class="col-lg-3 col-sm-6">
|
||
<div class="row">
|
||
<div class="col-lg-3 col-sm-6">
|
||
|
||
<div id="v3CnaIconContributor">
|
||
<img src="/site-media/images/NVD_Contributor_Stack_Plain.svg"
|
||
class="cvssNvdIcon"
|
||
alt="Nist CVSS score does not match with CNA score">
|
||
|
||
</div>
|
||
|
||
|
||
</div>
|
||
<div class="col-lg-9 col-sm-6">
|
||
<strong>CNA:</strong> <span class="wrapData"
|
||
data-testid="vuln-cvss3-source-cna">Intel Corporation</span>
|
||
|
||
</div>
|
||
</div>
|
||
</div>
|
||
<div class="col-lg-3 col-sm-6">
|
||
<span><strong>Base
|
||
Score:</strong> <span class="severityDetail"> <a
|
||
id="Cvss3CnaCalculatorAnchor"
|
||
href="/vuln-metrics/cvss/v3-calculator?name=CVE-2022-38083&vector=AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:L/A:N&version=3.1&source=Intel%20Corporation"
|
||
data-testid="vuln-cvss3-cna-panel-score"
|
||
class="label label-warning">6.1 MEDIUM</a></span></span>
|
||
</div>
|
||
<div class="col-lg-6 col-sm-12">
|
||
<span><strong>Vector:</strong> <span
|
||
data-testid="vuln-cvss3-cna-vector"
|
||
class="tooltipCvss3CnaMetrics">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:L/A:N</span></span>
|
||
<input type="hidden" id="cnaV3MetricHidden"
|
||
value="<span id = 'nistV3Metric' style = 'display:none' > <strong style ='font-size:1.2em' > CVSS v3.1 Severity and Metrics:</strong> <p data-testid='vuln-cvssv3-score-container'> <strong>Base Score: </strong> <span data-testid='vuln-cvssv3-base-score'>6.1 </span><span data-testid='vuln-cvssv3-base-score-severity'>MEDIUM</span> <br /> <strong>Vector: </strong> <span data-testid='vuln-cvssv3-vector'> AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:L/A:N </span> <br /> <strong>Impact Score: </strong> <span data-testid='vuln-cvssv3-impact-score'> 4.7 </span> <br /> <strong>Exploitability Score: </strong> <span data-testid='vuln-cvssv3-exploitability-score'> 0.8 </span> </p> <hr /> <p data-testid='vuln-cvssv3-metrics-container'> <strong>Attack Vector (AV): </strong> <span data-testid='vuln-cvssv3-av'> Local </span> <br /> <strong>Attack Complexity (AC): </strong> <span data-testid='vuln-cvssv3-ac'> High </span> <br /> <strong>Privileges Required (PR): </strong> <span data-testid='vuln-cvssv3-pr'> High </span> <br /> <strong>User Interaction (UI): </strong> <span data-testid='vuln-cvssv3-ui'> None </span> <br /> <strong>Scope (S): </strong> <span data-testid='vuln-cvssv3-s'> Changed </span> <br /> <strong>Confidentiality (C): </strong> <span data-testid='vuln-cvssv3-c'> High </span> <br /> <strong>Integrity (I): </strong> <span data-testid='vuln-cvssv3-i'> Low </span> <br /> <strong>Availability (A): </strong> <span data-testid='vuln-cvssv3-a'> None </span> </p> </span> "/>
|
||
</div>
|
||
</div>
|
||
|
||
<!-- ADP -->
|
||
|
||
|
||
|
||
|
||
<!-- <div id="cvss3FootNote" class="cvssFootNote" >-->
|
||
<!-- <br/><br/>-->
|
||
<!-- <span id = "cvss3FootNoteSection" th:utext="${cvssData.cvss3FootNoteHtml}"></span>-->
|
||
<!-- </div>-->
|
||
</div>
|
||
|
||
<!-- CVSS V2.0 -->
|
||
<div class="container-fluid" id="Vuln2CvssPanel" data-testid="vuln-cvss2-panel"
|
||
style="display: none;">
|
||
<strong>CVSS 2.0 Severity and Vector Strings:</strong> <br/> <br/>
|
||
<!-- NIST -->
|
||
<div class="row no-gutters">
|
||
<div class="col-lg-3 col-sm-6">
|
||
<div class="row">
|
||
<div class="col-lg-3 col-sm-6">
|
||
<img
|
||
src="/site-media/images/NVD_NVD_Stack_Plain.svg"
|
||
class="cvssNvdIcon"
|
||
alt="National Institute of Standards and Technology">
|
||
</div>
|
||
<div class="col-lg-9 col-sm-6">
|
||
<strong>NIST:</strong> <span
|
||
data-testid="vuln-cvss2-source-nvd">NVD</span>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
<div class="col-lg-3 col-sm-6">
|
||
|
||
<span><strong>Base
|
||
Score:</strong> <span class="severityDetail"><a
|
||
id="Cvss2CalculatorAnchorNA" class="label label-default"
|
||
data-testid="vuln-cvss2-panel-score-na"
|
||
href=''>N/A</a></span></span>
|
||
|
||
</div>
|
||
<div class="col-lg-6 col-sm-12">
|
||
<span><span
|
||
data-testid="vuln-cvss2-panel-vector-na">NVD assessment
|
||
not yet provided.</span></span> <input type="hidden"
|
||
id="nistV2MetricHidden"
|
||
value=""/>
|
||
</div>
|
||
</div>
|
||
<!-- CNA -->
|
||
|
||
|
||
<!-- ADP -->
|
||
|
||
|
||
<!-- <div id = "cvss2FootNote" class="cvssFootNote" >-->
|
||
<!-- <br/><br/>-->
|
||
<!-- <span id = "cvss2FootNoteSection" th:utext="${cvssData.cvss2FootNoteHtml}"></span>-->
|
||
<!-- </div>-->
|
||
</div>
|
||
</div>
|
||
|
||
|
||
<div class="row col-sm-12">
|
||
|
||
|
||
|
||
<div id="vulnHyperlinksPanel">
|
||
<h3>References to Advisories, Solutions, and Tools</h3>
|
||
<p>
|
||
By selecting these links, you will be leaving NIST webspace.
|
||
We have provided these links to other web sites because they
|
||
may have information that would be of interest to you. No
|
||
inferences should be drawn on account of other sites being
|
||
referenced, or not, from this page. There may be other web
|
||
sites that are more appropriate for your purpose. NIST does
|
||
not necessarily endorse the views expressed, or concur with
|
||
the facts presented on these sites. Further, NIST does not
|
||
endorse any commercial products that may be mentioned on
|
||
these sites. Please address comments about this page to <a
|
||
href="mailto:nvd@nist.gov">nvd@nist.gov</a>.
|
||
</p>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-hyperlinks-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Hyperlink</th>
|
||
<th>Resource</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-0">
|
||
<td data-testid="vuln-hyperlinks-link-0">
|
||
<a
|
||
href="http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00813.html"
|
||
target="_blank" rel="noopener noreferrer">http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00813.html</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-0">
|
||
<span>
|
||
<span class="badge">Vendor Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-1">
|
||
<td data-testid="vuln-hyperlinks-link-1">
|
||
<a
|
||
href="http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00813.html"
|
||
target="_blank" rel="noopener noreferrer">http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00813.html</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-1">
|
||
<span>
|
||
<span class="badge">Vendor Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-2">
|
||
<td data-testid="vuln-hyperlinks-link-2">
|
||
<a
|
||
href="https://security.netapp.com/advisory/ntap-20230824-0001/"
|
||
target="_blank" rel="noopener noreferrer">https://security.netapp.com/advisory/ntap-20230824-0001/</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-2">
|
||
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-3">
|
||
<td data-testid="vuln-hyperlinks-link-3">
|
||
<a
|
||
href="https://security.netapp.com/advisory/ntap-20230824-0001/"
|
||
target="_blank" rel="noopener noreferrer">https://security.netapp.com/advisory/ntap-20230824-0001/</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-3">
|
||
|
||
</td>
|
||
</tr>
|
||
|
||
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
</div>
|
||
|
||
|
||
|
||
<div id="vulnTechnicalDetailsDiv" class="technicalDetails"
|
||
data-testid="vuln-technical-details-container">
|
||
<h3>Weakness Enumeration</h3>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-CWEs-table">
|
||
<thead>
|
||
<tr>
|
||
<th>CWE-ID</th>
|
||
<th>CWE Name</th>
|
||
<th>Source</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
|
||
<tr data-testid="vuln-CWEs-row-0">
|
||
<td data-testid="vuln-CWEs-link-0">
|
||
<a href="http://cwe.mitre.org/data/definitions/665.html" target="_blank" rel="noopener noreferrer">CWE-665</a>
|
||
|
||
</td>
|
||
<td
|
||
data-testid="vuln-CWEs-link-0">Improper Initialization</td>
|
||
|
||
<td data-testid="vuln-cwes-assigner-0">
|
||
<span class="cweSource" data-testid="vuln-cwes-assigner-0-0"
|
||
>
|
||
<img src="/site-media/images/NVD_NVD_Stack_Plain.svg"
|
||
class="cweNvdIcon"
|
||
alt="cwe source acceptance level">
|
||
|
||
<span>NIST </span>
|
||
</span><span class="cweSource" data-testid="vuln-cwes-assigner-0-1"
|
||
>
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
<span>Intel Corporation </span>
|
||
</span>
|
||
|
||
</td>
|
||
|
||
</tr>
|
||
|
||
</tbody>
|
||
</table>
|
||
|
||
</div>
|
||
|
||
|
||
<div>
|
||
<h3>
|
||
Known Affected Software Configurations <small> <a
|
||
id="toggleCpeVersion" href="#vulnConfigurationsArea">Switch
|
||
to CPE 2.2</a></small>
|
||
</h3>
|
||
<span id="vulnConfigurationsArea"></span>
|
||
<input type="hidden" id="cveIdHidden" value="CVE-2022-38083"/>
|
||
|
||
<div>
|
||
|
||
<div id="vulnCpeTreeLoading"><h3>CPEs loading, please wait.</h3></div>
|
||
<div id="vulnCpeTree" style="display: none;"></div>
|
||
<input type="hidden"
|
||
id="InputRestBasePath"
|
||
value="/rest/public">
|
||
<input type="hidden" id="cveTreeJsonDataHidden" value="[{"id":1,"dataTestId":"vuln-software-config-1","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-1-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-1-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-2745nx_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-2745nx_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-2745nx_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-0-0","id":"15655336","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-1-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-2745nx%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-2745nx:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-2745nx:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1-0","id":"15655463","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":2,"dataTestId":"vuln-software-config-2","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-2-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-2-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-2757nx_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-2757nx_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-2757nx_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-0-0","id":"15655464","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-2-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-2757nx%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-2757nx:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-2757nx:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-0","id":"15655337","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":3,"dataTestId":"vuln-software-config-3","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-3-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-3-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-2777nx_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-2777nx_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-2777nx_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-0-0","id":"15655338","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-3-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-2777nx%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-2777nx:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-2777nx:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-0","id":"15655465","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":4,"dataTestId":"vuln-software-config-4","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-4-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-4-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-2798nx_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-2798nx_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-2798nx_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-0-0","id":"15655466","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-4-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-2798nx%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-2798nx:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-2798nx:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-1-0","id":"15655339","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":5,"dataTestId":"vuln-software-config-5","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-5-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-5-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1702_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1702_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1702_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-0-0","id":"15655340","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-5-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1702%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1702:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1702:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-1-0","id":"15655467","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":6,"dataTestId":"vuln-software-config-6","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-6-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-6-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1712tr_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1712tr_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1712tr_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-6-0-0-0","id":"15655468","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-6-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1712tr%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1712tr:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1712tr:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-6-0-1-0","id":"15655341","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":7,"dataTestId":"vuln-software-config-7","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-7-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-7-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1713nt_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1713nt_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1713nt_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-7-0-0-0","id":"15655342","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-7-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1713nt%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1713nt:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1713nt:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-7-0-1-0","id":"15655469","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":8,"dataTestId":"vuln-software-config-8","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-8-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-8-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1713nte_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1713nte_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1713nte_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-8-0-0-0","id":"15655470","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-8-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1713nte%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1713nte:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1713nte:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-8-0-1-0","id":"15655343","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":9,"dataTestId":"vuln-software-config-9","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-9-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-9-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1714_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1714_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1714_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-0-0","id":"15655344","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-9-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1714%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1714:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1714:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-1-0","id":"15655471","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":10,"dataTestId":"vuln-software-config-10","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-10-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-10-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1715ter_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1715ter_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1715ter_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-0-0","id":"15655472","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-10-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1715ter%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1715ter:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1715ter:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-1-0","id":"15655345","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":11,"dataTestId":"vuln-software-config-11","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-11-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-11-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1718t_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1718t_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1718t_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-0-0","id":"15655346","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-11-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1718t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1718t:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1718t:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-1-0","id":"15655473","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":12,"dataTestId":"vuln-software-config-12","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-12-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-12-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1722ne_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1722ne_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1722ne_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-12-0-0-0","id":"15655474","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-12-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1722ne%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1722ne:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1722ne:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-12-0-1-0","id":"15655347","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":13,"dataTestId":"vuln-software-config-13","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-13-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-13-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1726_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1726_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1726_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-13-0-0-0","id":"15655348","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-13-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1726%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1726:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1726:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-13-0-1-0","id":"15655475","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":14,"dataTestId":"vuln-software-config-14","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-14-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-14-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1732te_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1732te_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1732te_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-14-0-0-0","id":"15655476","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-14-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1732te%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1732te:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1732te:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-14-0-1-0","id":"15655349","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":15,"dataTestId":"vuln-software-config-15","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-15-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-15-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1733nt_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1733nt_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1733nt_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-15-0-0-0","id":"15655350","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-15-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1733nt%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1733nt:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1733nt:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-15-0-1-0","id":"15655477","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":16,"dataTestId":"vuln-software-config-16","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-16-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-16-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1734nt_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1734nt_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1734nt_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-16-0-0-0","id":"15655478","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-16-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1734nt%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1734nt:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1734nt:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-16-0-1-0","id":"15655351","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":17,"dataTestId":"vuln-software-config-17","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-17-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-17-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1735tr_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1735tr_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1735tr_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-17-0-0-0","id":"15655352","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-17-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1735tr%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1735tr:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1735tr:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-17-0-1-0","id":"15655479","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":18,"dataTestId":"vuln-software-config-18","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-18-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-18-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1736_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1736_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1736_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-18-0-0-0","id":"15655480","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-18-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1736%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1736:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1736:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-18-0-1-0","id":"15655353","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":19,"dataTestId":"vuln-software-config-19","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-19-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-19-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1736nt_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1736nt_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1736nt_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-19-0-0-0","id":"15655354","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-19-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1736nt%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1736nt:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1736nt:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-19-0-1-0","id":"15655481","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":20,"dataTestId":"vuln-software-config-20","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-20-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-20-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1739_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1739_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1739_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-20-0-0-0","id":"15655482","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-20-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1739%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1739:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1739:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-20-0-1-0","id":"15655355","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":21,"dataTestId":"vuln-software-config-21","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-21-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-21-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1746ter_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1746ter_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1746ter_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-21-0-0-0","id":"15655356","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-21-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1746ter%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1746ter:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1746ter:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-21-0-1-0","id":"15655483","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":22,"dataTestId":"vuln-software-config-22","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-22-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-22-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1747nte_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1747nte_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1747nte_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-22-0-0-0","id":"15655484","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-22-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1747nte%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1747nte:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1747nte:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-22-0-1-0","id":"15655357","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":23,"dataTestId":"vuln-software-config-23","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-23-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-23-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1748te_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1748te_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1748te_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-23-0-0-0","id":"15655358","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-23-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1748te%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1748te:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1748te:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-23-0-1-0","id":"15655485","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":24,"dataTestId":"vuln-software-config-24","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-24-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-24-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1749nt_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1749nt_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1749nt_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-24-0-0-0","id":"15655486","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-24-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1749nt%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1749nt:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1749nt:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-24-0-1-0","id":"15655359","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":25,"dataTestId":"vuln-software-config-25","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-25-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-25-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-2712t_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-2712t_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-2712t_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-25-0-0-0","id":"15655360","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-25-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-2712t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-2712t:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-2712t:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-25-0-1-0","id":"15655487","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":26,"dataTestId":"vuln-software-config-26","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-26-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-26-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-2733nt_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-2733nt_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-2733nt_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-26-0-0-0","id":"15655488","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-26-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-2733nt%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-2733nt:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-2733nt:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-26-0-1-0","id":"15655361","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":27,"dataTestId":"vuln-software-config-27","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-27-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-27-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-2738_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-2738_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-2738_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-27-0-0-0","id":"15655362","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-27-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-2738%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-2738:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-2738:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-27-0-1-0","id":"15655489","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":28,"dataTestId":"vuln-software-config-28","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-28-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-28-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-2752nte_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-2752nte_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-2752nte_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-28-0-0-0","id":"15655490","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-28-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-2752nte%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-2752nte:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-2752nte:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-28-0-1-0","id":"15655363","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":29,"dataTestId":"vuln-software-config-29","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-29-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-29-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-2752ter_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-2752ter_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-2752ter_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-29-0-0-0","id":"15655364","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-29-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-2752ter%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-2752ter:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-2752ter:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-29-0-1-0","id":"15655491","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":30,"dataTestId":"vuln-software-config-30","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-30-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-30-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-2753nt_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-2753nt_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-2753nt_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-30-0-0-0","id":"15655492","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-30-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-2753nt%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-2753nt:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-2753nt:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-30-0-1-0","id":"15655365","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":31,"dataTestId":"vuln-software-config-31","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-31-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-31-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-2766nt_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-2766nt_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-2766nt_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-31-0-0-0","id":"15655366","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-31-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-2766nt%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-2766nt:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-2766nt:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-31-0-1-0","id":"15655493","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":32,"dataTestId":"vuln-software-config-32","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-32-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-32-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-2775te_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-2775te_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-2775te_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-32-0-0-0","id":"15655494","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-32-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-2775te%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-2775te:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-2775te:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-32-0-1-0","id":"15655367","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":33,"dataTestId":"vuln-software-config-33","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-33-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-33-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-2776nt_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-2776nt_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-2776nt_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-33-0-0-0","id":"15655368","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-33-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-2776nt%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-2776nt:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-2776nt:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-33-0-1-0","id":"15655495","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":34,"dataTestId":"vuln-software-config-34","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-34-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-34-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-2779_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-2779_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-2779_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-34-0-0-0","id":"15655496","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-34-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-2779%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-2779:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-2779:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-34-0-1-0","id":"15655369","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":35,"dataTestId":"vuln-software-config-35","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-35-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-35-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-2786nte_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-2786nte_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-2786nte_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-35-0-0-0","id":"15655370","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-35-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-2786nte%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-2786nte:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-2786nte:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-35-0-1-0","id":"15655497","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":36,"dataTestId":"vuln-software-config-36","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-36-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-36-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-2795nt_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-2795nt_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-2795nt_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-36-0-0-0","id":"15655498","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-36-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-2795nt%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-2795nt:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-2795nt:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-36-0-1-0","id":"15655371","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":37,"dataTestId":"vuln-software-config-37","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-37-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-37-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-2796nt_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-2796nt_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-2796nt_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-37-0-0-0","id":"15655372","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-37-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-2796nt%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-2796nt:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-2796nt:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-37-0-1-0","id":"15655499","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":38,"dataTestId":"vuln-software-config-38","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-38-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-38-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-2796te_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-2796te_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-2796te_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-38-0-0-0","id":"15655500","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-38-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-2796te%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-2796te:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-2796te:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-38-0-1-0","id":"15655373","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":39,"dataTestId":"vuln-software-config-39","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-39-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-39-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-2798nt_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-2798nt_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-2798nt_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-39-0-0-0","id":"15655374","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-39-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-2798nt%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-2798nt:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-2798nt:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-39-0-1-0","id":"15655501","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":40,"dataTestId":"vuln-software-config-40","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-40-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-40-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-2799_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-2799_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-2799_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-40-0-0-0","id":"15655502","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-40-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-2799%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-2799:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-2799:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-40-0-1-0","id":"15655375","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":41,"dataTestId":"vuln-software-config-41","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-41-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-41-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1602_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1602_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1602_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-41-0-0-0","id":"15655376","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-41-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1602%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1602:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1602:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-41-0-1-0","id":"15655503","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":42,"dataTestId":"vuln-software-config-42","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-42-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-42-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1622_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1622_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1622_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-42-0-0-0","id":"15655504","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-42-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1622%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1622:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1622:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-42-0-1-0","id":"15655377","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":43,"dataTestId":"vuln-software-config-43","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-43-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-43-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1623n_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1623n_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1623n_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-43-0-0-0","id":"15655378","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-43-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1623n%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1623n:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1623n:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-43-0-1-0","id":"15655505","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":44,"dataTestId":"vuln-software-config-44","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-44-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-44-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1627_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1627_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1627_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-44-0-0-0","id":"15655506","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-44-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1627%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1627:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1627:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-44-0-1-0","id":"15655379","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":45,"dataTestId":"vuln-software-config-45","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-45-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-45-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1633n_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1633n_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1633n_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-45-0-0-0","id":"15655380","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-45-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1633n%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1633n:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1633n:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-45-0-1-0","id":"15655507","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":46,"dataTestId":"vuln-software-config-46","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-46-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-46-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1637_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1637_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1637_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-46-0-0-0","id":"15655508","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-46-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1637%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1637:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1637:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-46-0-1-0","id":"15655381","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":47,"dataTestId":"vuln-software-config-47","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-47-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-47-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1649n_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1649n_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1649n_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-47-0-0-0","id":"15655382","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-47-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1649n%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1649n:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1649n:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-47-0-1-0","id":"15655509","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":48,"dataTestId":"vuln-software-config-48","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-48-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-48-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1653n_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1653n_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1653n_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-48-0-0-0","id":"15655510","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-48-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1653n%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1653n:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1653n:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-48-0-1-0","id":"15655383","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":49,"dataTestId":"vuln-software-config-49","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-49-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-49-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-2123it_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-2123it_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-2123it_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-49-0-0-0","id":"15655384","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-49-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-2123it%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-2123it:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-2123it:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-49-0-1-0","id":"15655511","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":50,"dataTestId":"vuln-software-config-50","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-50-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-50-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-2141i_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-2141i_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-2141i_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-50-0-0-0","id":"15655512","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-50-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-2141i%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-2141i:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-2141i:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-50-0-1-0","id":"15655385","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":51,"dataTestId":"vuln-software-config-51","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-51-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-51-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-2142it_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-2142it_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-2142it_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-51-0-0-0","id":"15655386","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-51-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-2142it%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-2142it:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-2142it:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-51-0-1-0","id":"15655513","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":52,"dataTestId":"vuln-software-config-52","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-52-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-52-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-2143it_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-2143it_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-2143it_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-52-0-0-0","id":"15655514","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-52-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-2143it%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-2143it:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-2143it:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-52-0-1-0","id":"15655387","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":53,"dataTestId":"vuln-software-config-53","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-53-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-53-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-2145nt_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-2145nt_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-2145nt_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-53-0-0-0","id":"15655388","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-53-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-2145nt%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-2145nt:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-2145nt:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-53-0-1-0","id":"15655515","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":54,"dataTestId":"vuln-software-config-54","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-54-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-54-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-2146nt_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-2146nt_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-2146nt_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-54-0-0-0","id":"15655516","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-54-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-2146nt%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-2146nt:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-2146nt:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-54-0-1-0","id":"15655389","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":55,"dataTestId":"vuln-software-config-55","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-55-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-55-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-2161i_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-2161i_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-2161i_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-55-0-0-0","id":"15655390","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-55-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-2161i%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-2161i:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-2161i:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-55-0-1-0","id":"15655517","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":56,"dataTestId":"vuln-software-config-56","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-56-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-56-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-2163it_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-2163it_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-2163it_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-56-0-0-0","id":"15655518","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-56-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-2163it%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-2163it:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-2163it:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-56-0-1-0","id":"15655391","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":57,"dataTestId":"vuln-software-config-57","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-57-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-57-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-2166nt_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-2166nt_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-2166nt_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-57-0-0-0","id":"15655392","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-57-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-2166nt%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-2166nt:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-2166nt:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-57-0-1-0","id":"15655519","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":58,"dataTestId":"vuln-software-config-58","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-58-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-58-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-2173it_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-2173it_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-2173it_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-58-0-0-0","id":"15655520","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-58-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-2173it%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-2173it:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-2173it:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-58-0-1-0","id":"15655393","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":59,"dataTestId":"vuln-software-config-59","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-59-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-59-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-2177nt_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-2177nt_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-2177nt_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-59-0-0-0","id":"15655394","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-59-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-2177nt%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-2177nt:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-2177nt:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-59-0-1-0","id":"15655521","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":60,"dataTestId":"vuln-software-config-60","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-60-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-60-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-2183it_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-2183it_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-2183it_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-60-0-0-0","id":"15655522","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-60-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-2183it%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-2183it:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-2183it:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-60-0-1-0","id":"15655395","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":61,"dataTestId":"vuln-software-config-61","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-61-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-61-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-2187nt_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-2187nt_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-2187nt_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-61-0-0-0","id":"15655396","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-61-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-2187nt%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-2187nt:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-2187nt:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-61-0-1-0","id":"15655523","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":62,"dataTestId":"vuln-software-config-62","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-62-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-62-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1513n_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1513n_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1513n_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-62-0-0-0","id":"15655524","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-62-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1513n%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1513n:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1513n:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-62-0-1-0","id":"15655397","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":63,"dataTestId":"vuln-software-config-63","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-63-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-63-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1523n_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1523n_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1523n_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-63-0-0-0","id":"15655398","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-63-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1523n%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1523n:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1523n:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-63-0-1-0","id":"15655525","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":64,"dataTestId":"vuln-software-config-64","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-64-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-64-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1533n_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1533n_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1533n_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-64-0-0-0","id":"15655526","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-64-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1533n%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1533n:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1533n:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-64-0-1-0","id":"15655399","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":65,"dataTestId":"vuln-software-config-65","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-65-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-65-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1543n_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1543n_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1543n_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-65-0-0-0","id":"15655400","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-65-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1543n%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1543n:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1543n:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-65-0-1-0","id":"15655527","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":66,"dataTestId":"vuln-software-config-66","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-66-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-66-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1553n_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1553n_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1553n_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-66-0-0-0","id":"15655528","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-66-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1553n%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1553n:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1553n:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-66-0-1-0","id":"15655401","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":67,"dataTestId":"vuln-software-config-67","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-67-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-67-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1529_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1529_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1529_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-67-0-0-0","id":"15655402","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-67-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1529%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1529:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1529:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-67-0-1-0","id":"15655529","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":68,"dataTestId":"vuln-software-config-68","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-68-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-68-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1539_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1539_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1539_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-68-0-0-0","id":"15655530","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-68-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1539%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1539:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1539:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-68-0-1-0","id":"15655403","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":69,"dataTestId":"vuln-software-config-69","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-69-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-69-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1559_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1559_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1559_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-69-0-0-0","id":"15655404","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-69-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1559%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1559:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1559:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-69-0-1-0","id":"15655531","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":70,"dataTestId":"vuln-software-config-70","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-70-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-70-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1557_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1557_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1557_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-70-0-0-0","id":"15655532","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-70-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1557%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1557:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1557:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-70-0-1-0","id":"15655405","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":71,"dataTestId":"vuln-software-config-71","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-71-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-71-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1567_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1567_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1567_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-71-0-0-0","id":"15655406","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-71-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1567%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1567:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1567:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-71-0-1-0","id":"15655533","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":72,"dataTestId":"vuln-software-config-72","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-72-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-72-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1571_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1571_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1571_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-72-0-0-0","id":"15655534","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-72-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1571%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1571:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1571:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-72-0-1-0","id":"15655407","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":73,"dataTestId":"vuln-software-config-73","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-73-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-73-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1577_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1577_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1577_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-73-0-0-0","id":"15655408","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-73-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1577%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1577:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1577:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-73-0-1-0","id":"15655535","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":74,"dataTestId":"vuln-software-config-74","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-74-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-74-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1518_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1518_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1518_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-74-0-0-0","id":"15655536","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-74-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1518%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1518:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1518:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-74-0-1-0","id":"15655409","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":75,"dataTestId":"vuln-software-config-75","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-75-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-75-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1521_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1521_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1521_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-75-0-0-0","id":"15655410","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-75-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1521%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1521:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1521:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-75-0-1-0","id":"15655537","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":76,"dataTestId":"vuln-software-config-76","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-76-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-76-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1527_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1527_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1527_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-76-0-0-0","id":"15655538","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-76-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1527%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1527:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1527:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-76-0-1-0","id":"15655411","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":77,"dataTestId":"vuln-software-config-77","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-77-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-77-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1528_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1528_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1528_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-77-0-0-0","id":"15655412","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-77-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1528%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1528:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1528:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-77-0-1-0","id":"15655539","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":78,"dataTestId":"vuln-software-config-78","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-78-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-78-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1531_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1531_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1531_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-78-0-0-0","id":"15655540","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-78-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1531%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1531:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1531:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-78-0-1-0","id":"15655413","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":79,"dataTestId":"vuln-software-config-79","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-79-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-79-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1537_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1537_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1537_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-79-0-0-0","id":"15655414","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-79-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1537%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1537:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1537:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-79-0-1-0","id":"15655541","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":80,"dataTestId":"vuln-software-config-80","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-80-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-80-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1541_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1541_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1541_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-80-0-0-0","id":"15655542","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-80-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1541%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1541:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1541:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-80-0-1-0","id":"15655415","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":81,"dataTestId":"vuln-software-config-81","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-81-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-81-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1548_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1548_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1548_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-81-0-0-0","id":"15655416","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-81-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1548%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1548:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1548:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-81-0-1-0","id":"15655543","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":82,"dataTestId":"vuln-software-config-82","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-82-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-82-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1520_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1520_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1520_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-82-0-0-0","id":"15655544","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-82-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1520%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1520:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1520:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-82-0-1-0","id":"15655417","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":83,"dataTestId":"vuln-software-config-83","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-83-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-83-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1540_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1540_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1540_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-83-0-0-0","id":"15655418","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-83-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1540%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1540:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1540:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-83-0-1-0","id":"15655545","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":84,"dataTestId":"vuln-software-config-84","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-84-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-84-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e5-4610_v3_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e5-4610_v3_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e5-4610_v3_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-84-0-0-0","id":"15655546","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-84-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e5-4610_v3%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e5-4610_v3:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e5-4610_v3:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-84-0-1-0","id":"15655419","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":85,"dataTestId":"vuln-software-config-85","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-85-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-85-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e5-4620_v3_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e5-4620_v3_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e5-4620_v3_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-85-0-0-0","id":"15655420","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-85-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e5-4620_v3%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e5-4620_v3:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e5-4620_v3:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-85-0-1-0","id":"15655547","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":86,"dataTestId":"vuln-software-config-86","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-86-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-86-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e5-4627_v3_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e5-4627_v3_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e5-4627_v3_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-86-0-0-0","id":"15655548","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-86-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e5-4627_v3%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e5-4627_v3:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e5-4627_v3:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-86-0-1-0","id":"15655421","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":87,"dataTestId":"vuln-software-config-87","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-87-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-87-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e5-4640_v3_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e5-4640_v3_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e5-4640_v3_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-87-0-0-0","id":"15655422","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-87-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e5-4640_v3%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e5-4640_v3:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e5-4640_v3:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-87-0-1-0","id":"15655549","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":88,"dataTestId":"vuln-software-config-88","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-88-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-88-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e5-4648_v3_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e5-4648_v3_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e5-4648_v3_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-88-0-0-0","id":"15655550","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-88-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e5-4648_v3%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e5-4648_v3:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e5-4648_v3:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-88-0-1-0","id":"15655423","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":89,"dataTestId":"vuln-software-config-89","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-89-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-89-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e5-4650_v3_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e5-4650_v3_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e5-4650_v3_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-89-0-0-0","id":"15655424","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-89-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e5-4650_v3%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e5-4650_v3:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e5-4650_v3:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-89-0-1-0","id":"15655551","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":90,"dataTestId":"vuln-software-config-90","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-90-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-90-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e5-4655_v3_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e5-4655_v3_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e5-4655_v3_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-90-0-0-0","id":"15655552","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-90-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e5-4655_v3%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e5-4655_v3:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e5-4655_v3:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-90-0-1-0","id":"15655425","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":91,"dataTestId":"vuln-software-config-91","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-91-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-91-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e5-4660_v3_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e5-4660_v3_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e5-4660_v3_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-91-0-0-0","id":"15655426","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-91-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e5-4660_v3%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e5-4660_v3:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e5-4660_v3:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-91-0-1-0","id":"15655553","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":92,"dataTestId":"vuln-software-config-92","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-92-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-92-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e5-4667_v3_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e5-4667_v3_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e5-4667_v3_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-92-0-0-0","id":"15655554","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-92-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e5-4667_v3%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e5-4667_v3:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e5-4667_v3:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-92-0-1-0","id":"15655427","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":93,"dataTestId":"vuln-software-config-93","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-93-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-93-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e5-4669_v3_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e5-4669_v3_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e5-4669_v3_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-93-0-0-0","id":"15655428","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-93-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e5-4669_v3%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e5-4669_v3:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e5-4669_v3:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-93-0-1-0","id":"15655555","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":94,"dataTestId":"vuln-software-config-94","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-94-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-94-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e5-2658a_v3_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e5-2658a_v3_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e5-2658a_v3_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-94-0-0-0","id":"15655556","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-94-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e5-2658a_v3%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e5-2658a_v3:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e5-2658a_v3:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-94-0-1-0","id":"15655429","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":95,"dataTestId":"vuln-software-config-95","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-95-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-95-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e5-1428l_v3_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e5-1428l_v3_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e5-1428l_v3_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-95-0-0-0","id":"15655430","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-95-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e5-1428l_v3%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e5-1428l_v3:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e5-1428l_v3:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-95-0-1-0","id":"15655557","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":96,"dataTestId":"vuln-software-config-96","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-96-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-96-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e5-2408l_v3_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e5-2408l_v3_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e5-2408l_v3_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-96-0-0-0","id":"15655558","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-96-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e5-2408l_v3%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e5-2408l_v3:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e5-2408l_v3:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-96-0-1-0","id":"15655431","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":97,"dataTestId":"vuln-software-config-97","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-97-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-97-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e5-2418l_v3_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e5-2418l_v3_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e5-2418l_v3_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-97-0-0-0","id":"15655432","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-97-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e5-2418l_v3%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e5-2418l_v3:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e5-2418l_v3:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-97-0-1-0","id":"15655559","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":98,"dataTestId":"vuln-software-config-98","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-98-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-98-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e5-2428l_v3_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e5-2428l_v3_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e5-2428l_v3_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-98-0-0-0","id":"15655560","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-98-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e5-2428l_v3%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e5-2428l_v3:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e5-2428l_v3:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-98-0-1-0","id":"15655433","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":99,"dataTestId":"vuln-software-config-99","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-99-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-99-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e5-2438l_v3_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e5-2438l_v3_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e5-2438l_v3_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-99-0-0-0","id":"15655434","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-99-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e5-2438l_v3%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e5-2438l_v3:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e5-2438l_v3:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-99-0-1-0","id":"15655561","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":100,"dataTestId":"vuln-software-config-100","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-100-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-100-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e5-1620_v3_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e5-1620_v3_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e5-1620_v3_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-100-0-0-0","id":"15655562","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-100-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e5-1620_v3%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e5-1620_v3:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e5-1620_v3:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-100-0-1-0","id":"15655435","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":101,"dataTestId":"vuln-software-config-101","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-101-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-101-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e5-1630_v3_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e5-1630_v3_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e5-1630_v3_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-101-0-0-0","id":"15655436","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-101-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e5-1630_v3%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e5-1630_v3:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e5-1630_v3:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-101-0-1-0","id":"15655563","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":102,"dataTestId":"vuln-software-config-102","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-102-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-102-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e5-1650_v3_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e5-1650_v3_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e5-1650_v3_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-102-0-0-0","id":"15655564","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-102-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e5-1650_v3%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e5-1650_v3:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e5-1650_v3:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-102-0-1-0","id":"15655437","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":103,"dataTestId":"vuln-software-config-103","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-103-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-103-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e5-1660_v3_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e5-1660_v3_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e5-1660_v3_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-103-0-0-0","id":"15655438","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-103-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e5-1660_v3%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e5-1660_v3:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e5-1660_v3:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-103-0-1-0","id":"15655565","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":104,"dataTestId":"vuln-software-config-104","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-104-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-104-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e5-1680_v3_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e5-1680_v3_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e5-1680_v3_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-104-0-0-0","id":"15655566","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-104-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e5-1680_v3%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e5-1680_v3:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e5-1680_v3:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-104-0-1-0","id":"15655439","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":105,"dataTestId":"vuln-software-config-105","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-105-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-105-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e5-2603_v3_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e5-2603_v3_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e5-2603_v3_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-105-0-0-0","id":"15655440","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-105-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e5-2603_v3%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e5-2603_v3:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e5-2603_v3:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-105-0-1-0","id":"15655567","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":106,"dataTestId":"vuln-software-config-106","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-106-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-106-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e5-2608l_v3_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e5-2608l_v3_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e5-2608l_v3_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-106-0-0-0","id":"15655568","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-106-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e5-2608l_v3%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e5-2608l_v3:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e5-2608l_v3:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-106-0-1-0","id":"15655441","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":107,"dataTestId":"vuln-software-config-107","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-107-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-107-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e5-2609_v3_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e5-2609_v3_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e5-2609_v3_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-107-0-0-0","id":"15655442","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-107-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e5-2609_v3%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e5-2609_v3:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e5-2609_v3:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-107-0-1-0","id":"15655569","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":108,"dataTestId":"vuln-software-config-108","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-108-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-108-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e5-2618l_v3_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e5-2618l_v3_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e5-2618l_v3_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-108-0-0-0","id":"15655570","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-108-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e5-2618l_v3%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e5-2618l_v3:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e5-2618l_v3:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-108-0-1-0","id":"15655571","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":109,"dataTestId":"vuln-software-config-109","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-109-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-109-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e5-2620_v3_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e5-2620_v3_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e5-2620_v3_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-109-0-0-0","id":"15655572","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-109-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e5-2620_v3%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e5-2620_v3:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e5-2620_v3:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-109-0-1-0","id":"15655443","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":110,"dataTestId":"vuln-software-config-110","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-110-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-110-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e5-2623_v3_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e5-2623_v3_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e5-2623_v3_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-110-0-0-0","id":"15655444","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-110-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e5-2623_v3%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e5-2623_v3:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e5-2623_v3:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-110-0-1-0","id":"15655573","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":111,"dataTestId":"vuln-software-config-111","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-111-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-111-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e5-2628l_v3_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e5-2628l_v3_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e5-2628l_v3_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-111-0-0-0","id":"15655574","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-111-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e5-2628l_v3%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e5-2628l_v3:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e5-2628l_v3:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-111-0-1-0","id":"15655445","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":112,"dataTestId":"vuln-software-config-112","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-112-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-112-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e5-2630_v3_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e5-2630_v3_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e5-2630_v3_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-112-0-0-0","id":"15655446","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-112-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e5-2630_v3%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e5-2630_v3:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e5-2630_v3:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-112-0-1-0","id":"15655575","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":113,"dataTestId":"vuln-software-config-113","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-113-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-113-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e5-2630l_v3_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e5-2630l_v3_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e5-2630l_v3_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-113-0-0-0","id":"15655576","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-113-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e5-2630l_v3%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e5-2630l_v3:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e5-2630l_v3:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-113-0-1-0","id":"15655447","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":114,"dataTestId":"vuln-software-config-114","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-114-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-114-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e5-2637_v3_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e5-2637_v3_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e5-2637_v3_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-114-0-0-0","id":"15655448","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-114-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e5-2637_v3%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e5-2637_v3:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e5-2637_v3:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-114-0-1-0","id":"15655577","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":115,"dataTestId":"vuln-software-config-115","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-115-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-115-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e5-2640_v3_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e5-2640_v3_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e5-2640_v3_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-115-0-0-0","id":"15655578","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-115-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e5-2640_v3%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e5-2640_v3:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e5-2640_v3:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-115-0-1-0","id":"15655449","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":116,"dataTestId":"vuln-software-config-116","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-116-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-116-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e5-2643_v3_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e5-2643_v3_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e5-2643_v3_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-116-0-0-0","id":"15655450","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-116-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e5-2643_v3%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e5-2643_v3:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e5-2643_v3:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-116-0-1-0","id":"15655579","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":117,"dataTestId":"vuln-software-config-117","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-117-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-117-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e5-2648l_v3_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e5-2648l_v3_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e5-2648l_v3_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-117-0-0-0","id":"15655580","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-117-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e5-2648l_v3%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e5-2648l_v3:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e5-2648l_v3:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-117-0-1-0","id":"15655451","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":118,"dataTestId":"vuln-software-config-118","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-118-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-118-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e5-2650_v3_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e5-2650_v3_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e5-2650_v3_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-118-0-0-0","id":"15655452","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-118-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e5-2650_v3%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e5-2650_v3:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e5-2650_v3:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-118-0-1-0","id":"15655581","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":119,"dataTestId":"vuln-software-config-119","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-119-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-119-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e5-2650l_v3_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e5-2650l_v3_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e5-2650l_v3_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-119-0-0-0","id":"15655582","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-119-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e5-2650l_v3%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e5-2650l_v3:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e5-2650l_v3:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-119-0-1-0","id":"15655453","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":120,"dataTestId":"vuln-software-config-120","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-120-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-120-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e5-2658_v3_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e5-2658_v3_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e5-2658_v3_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-120-0-0-0","id":"15655454","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-120-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e5-2658_v3%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e5-2658_v3:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e5-2658_v3:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-120-0-1-0","id":"15655583","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":121,"dataTestId":"vuln-software-config-121","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-121-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-121-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e5-2660_v3_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e5-2660_v3_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e5-2660_v3_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-121-0-0-0","id":"15655584","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-121-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e5-2660_v3%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e5-2660_v3:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e5-2660_v3:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-121-0-1-0","id":"15655455","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":122,"dataTestId":"vuln-software-config-122","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-122-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-122-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e5-2667_v3_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e5-2667_v3_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e5-2667_v3_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-122-0-0-0","id":"15655456","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-122-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e5-2667_v3%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e5-2667_v3:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e5-2667_v3:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-122-0-1-0","id":"15655585","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":123,"dataTestId":"vuln-software-config-123","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-123-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-123-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e5-2670_v3_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e5-2670_v3_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e5-2670_v3_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-123-0-0-0","id":"15655586","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-123-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e5-2670_v3%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e5-2670_v3:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e5-2670_v3:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-123-0-1-0","id":"15655457","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":124,"dataTestId":"vuln-software-config-124","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-124-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-124-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e5-2680_v3_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e5-2680_v3_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e5-2680_v3_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-124-0-0-0","id":"15655458","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-124-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e5-2680_v3%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e5-2680_v3:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e5-2680_v3:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-124-0-1-0","id":"15655587","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":125,"dataTestId":"vuln-software-config-125","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-125-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-125-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e5-2683_v3_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e5-2683_v3_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e5-2683_v3_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-125-0-0-0","id":"15655588","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-125-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e5-2683_v3%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e5-2683_v3:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e5-2683_v3:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-125-0-1-0","id":"15655459","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":126,"dataTestId":"vuln-software-config-126","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-126-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-126-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e5-2687w_v3_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e5-2687w_v3_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e5-2687w_v3_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-126-0-0-0","id":"15655460","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-126-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e5-2687w_v3%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e5-2687w_v3:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e5-2687w_v3:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-126-0-1-0","id":"15655589","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":127,"dataTestId":"vuln-software-config-127","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-127-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-127-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e5-2690_v3_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e5-2690_v3_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e5-2690_v3_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-127-0-0-0","id":"15655590","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-127-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e5-2690_v3%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e5-2690_v3:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e5-2690_v3:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-127-0-1-0","id":"15655461","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":128,"dataTestId":"vuln-software-config-128","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-128-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-128-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e5-2695_v3_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e5-2695_v3_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e5-2695_v3_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-128-0-0-0","id":"15655462","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-128-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e5-2695_v3%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e5-2695_v3:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e5-2695_v3:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-128-0-1-0","id":"15655591","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":129,"dataTestId":"vuln-software-config-129","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-129-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-129-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e5-2697_v3_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e5-2697_v3_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e5-2697_v3_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-129-0-0-0","id":"15655592","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-129-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e5-2697_v3%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e5-2697_v3:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e5-2697_v3:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-129-0-1-0","id":"15655701","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":130,"dataTestId":"vuln-software-config-130","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-130-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-130-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e5-2698_v3_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e5-2698_v3_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e5-2698_v3_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-130-0-0-0","id":"15655702","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-130-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e5-2698_v3%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e5-2698_v3:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e5-2698_v3:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-130-0-1-0","id":"15655593","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":131,"dataTestId":"vuln-software-config-131","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-131-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-131-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e5-2699_v3_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e5-2699_v3_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e5-2699_v3_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-131-0-0-0","id":"15655594","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-131-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e5-2699_v3%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e5-2699_v3:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e5-2699_v3:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-131-0-1-0","id":"15655703","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":132,"dataTestId":"vuln-software-config-132","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-132-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-132-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e7-4809_v3_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e7-4809_v3_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e7-4809_v3_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-132-0-0-0","id":"15655704","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-132-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e7-4809_v3%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e7-4809_v3:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e7-4809_v3:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-132-0-1-0","id":"15655595","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":133,"dataTestId":"vuln-software-config-133","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-133-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-133-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e7-4820_v3_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e7-4820_v3_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e7-4820_v3_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-133-0-0-0","id":"15655596","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-133-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e7-4820_v3%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e7-4820_v3:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e7-4820_v3:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-133-0-1-0","id":"15655705","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":134,"dataTestId":"vuln-software-config-134","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-134-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-134-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e7-4830_v3_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e7-4830_v3_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e7-4830_v3_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-134-0-0-0","id":"15655706","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-134-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e7-4830_v3%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e7-4830_v3:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e7-4830_v3:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-134-0-1-0","id":"15655597","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":135,"dataTestId":"vuln-software-config-135","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-135-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-135-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e7-4850_v3_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e7-4850_v3_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e7-4850_v3_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-135-0-0-0","id":"15655598","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-135-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e7-4850_v3%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e7-4850_v3:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e7-4850_v3:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-135-0-1-0","id":"15655707","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":136,"dataTestId":"vuln-software-config-136","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-136-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-136-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e7-8860_v3_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e7-8860_v3_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e7-8860_v3_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-136-0-0-0","id":"15655708","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-136-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e7-8860_v3%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e7-8860_v3:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e7-8860_v3:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-136-0-1-0","id":"15655599","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":137,"dataTestId":"vuln-software-config-137","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-137-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-137-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e7-8867_v3_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e7-8867_v3_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e7-8867_v3_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-137-0-0-0","id":"15655600","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-137-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e7-8867_v3%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e7-8867_v3:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e7-8867_v3:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-137-0-1-0","id":"15655709","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":138,"dataTestId":"vuln-software-config-138","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-138-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-138-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e7-8870_v3_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e7-8870_v3_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e7-8870_v3_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-138-0-0-0","id":"15655710","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-138-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e7-8870_v3%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e7-8870_v3:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e7-8870_v3:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-138-0-1-0","id":"15655601","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":139,"dataTestId":"vuln-software-config-139","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-139-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-139-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e7-8880_v3_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e7-8880_v3_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e7-8880_v3_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-139-0-0-0","id":"15655602","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-139-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e7-8880_v3%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e7-8880_v3:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e7-8880_v3:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-139-0-1-0","id":"15655711","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":140,"dataTestId":"vuln-software-config-140","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-140-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-140-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e7-8880l_v3_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e7-8880l_v3_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e7-8880l_v3_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-140-0-0-0","id":"15655712","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-140-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e7-8880l_v3%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e7-8880l_v3:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e7-8880l_v3:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-140-0-1-0","id":"15655603","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":141,"dataTestId":"vuln-software-config-141","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-141-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-141-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e7-8890_v3_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e7-8890_v3_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e7-8890_v3_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-141-0-0-0","id":"15655604","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-141-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e7-8890_v3%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e7-8890_v3:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e7-8890_v3:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-141-0-1-0","id":"15655713","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":142,"dataTestId":"vuln-software-config-142","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-142-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-142-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e7-8891_v3_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e7-8891_v3_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e7-8891_v3_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-142-0-0-0","id":"15655714","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-142-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e7-8891_v3%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e7-8891_v3:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e7-8891_v3:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-142-0-1-0","id":"15655605","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":143,"dataTestId":"vuln-software-config-143","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-143-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-143-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e7-8893_v3_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e7-8893_v3_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e7-8893_v3_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-143-0-0-0","id":"15655606","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-143-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e7-8893_v3%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e7-8893_v3:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e7-8893_v3:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-143-0-1-0","id":"15655715","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":144,"dataTestId":"vuln-software-config-144","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-144-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-144-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e7-8894_v4_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e7-8894_v4_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e7-8894_v4_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-144-0-0-0","id":"15655716","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-144-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e7-8894_v4%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e7-8894_v4:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e7-8894_v4:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-144-0-1-0","id":"15655607","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":145,"dataTestId":"vuln-software-config-145","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-145-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-145-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e7-4809_v4_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e7-4809_v4_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e7-4809_v4_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-145-0-0-0","id":"15655608","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-145-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e7-4809_v4%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e7-4809_v4:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e7-4809_v4:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-145-0-1-0","id":"15655717","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":146,"dataTestId":"vuln-software-config-146","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-146-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-146-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e7-4820_v4_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e7-4820_v4_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e7-4820_v4_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-146-0-0-0","id":"15655718","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-146-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e7-4820_v4%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e7-4820_v4:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e7-4820_v4:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-146-0-1-0","id":"15655609","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":147,"dataTestId":"vuln-software-config-147","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-147-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-147-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e7-4830_v4_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e7-4830_v4_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e7-4830_v4_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-147-0-0-0","id":"15655610","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-147-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e7-4830_v4%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e7-4830_v4:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e7-4830_v4:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-147-0-1-0","id":"15655719","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":148,"dataTestId":"vuln-software-config-148","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-148-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-148-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e7-4850_v4_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e7-4850_v4_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e7-4850_v4_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-148-0-0-0","id":"15655720","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-148-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e7-4850_v4%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e7-4850_v4:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e7-4850_v4:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-148-0-1-0","id":"15655611","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":149,"dataTestId":"vuln-software-config-149","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-149-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-149-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e7-8860_v4_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e7-8860_v4_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e7-8860_v4_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-149-0-0-0","id":"15655612","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-149-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e7-8860_v4%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e7-8860_v4:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e7-8860_v4:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-149-0-1-0","id":"15655721","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":150,"dataTestId":"vuln-software-config-150","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-150-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-150-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e7-8867_v4_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e7-8867_v4_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e7-8867_v4_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-150-0-0-0","id":"15655722","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-150-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e7-8867_v4%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e7-8867_v4:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e7-8867_v4:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-150-0-1-0","id":"15655613","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":151,"dataTestId":"vuln-software-config-151","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-151-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-151-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e7-8870_v4_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e7-8870_v4_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e7-8870_v4_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-151-0-0-0","id":"15655614","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-151-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e7-8870_v4%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e7-8870_v4:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e7-8870_v4:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-151-0-1-0","id":"15655723","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":152,"dataTestId":"vuln-software-config-152","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-152-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-152-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e7-8880_v4_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e7-8880_v4_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e7-8880_v4_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-152-0-0-0","id":"15655724","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-152-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e7-8880_v4%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e7-8880_v4:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e7-8880_v4:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-152-0-1-0","id":"15655615","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":153,"dataTestId":"vuln-software-config-153","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-153-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-153-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e7-8890_v4_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e7-8890_v4_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e7-8890_v4_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-153-0-0-0","id":"15655616","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-153-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e7-8890_v4%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e7-8890_v4:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e7-8890_v4:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-153-0-1-0","id":"15655725","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":154,"dataTestId":"vuln-software-config-154","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-154-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-154-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e7-8891_v4_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e7-8891_v4_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e7-8891_v4_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-154-0-0-0","id":"15655726","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-154-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e7-8891_v4%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e7-8891_v4:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e7-8891_v4:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-154-0-1-0","id":"15655617","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":155,"dataTestId":"vuln-software-config-155","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-155-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-155-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e7-8893_v4_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e7-8893_v4_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e7-8893_v4_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-155-0-0-0","id":"15655618","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-155-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e7-8893_v4%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e7-8893_v4:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e7-8893_v4:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-155-0-1-0","id":"15655727","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":156,"dataTestId":"vuln-software-config-156","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-156-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-156-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e5-2699a_v4_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e5-2699a_v4_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e5-2699a_v4_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-156-0-0-0","id":"15655728","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-156-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e5-2699a_v4%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e5-2699a_v4:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e5-2699a_v4:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-156-0-1-0","id":"15655619","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":157,"dataTestId":"vuln-software-config-157","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-157-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-157-0-0","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e5-2699r_v4%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e5-2699r_v4:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e5-2699r_v4:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-157-0-0-0","id":"15655729","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-157-0-1","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e5-2699r_v4_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e5-2699r_v4_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e5-2699r_v4_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-157-0-1-0","id":"15655620","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":158,"dataTestId":"vuln-software-config-158","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-158-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-158-0-0","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e5-4610_v4%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e5-4610_v4:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e5-4610_v4:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-158-0-0-0","id":"15655621","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-158-0-1","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e5-4610_v4_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e5-4610_v4_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e5-4610_v4_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-158-0-1-0","id":"15655730","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":159,"dataTestId":"vuln-software-config-159","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-159-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-159-0-0","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e5-4620_v4%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e5-4620_v4:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e5-4620_v4:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-159-0-0-0","id":"15655731","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-159-0-1","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e5-4620_v4_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e5-4620_v4_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e5-4620_v4_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-159-0-1-0","id":"15655622","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":160,"dataTestId":"vuln-software-config-160","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-160-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-160-0-0","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e5-4627_v4%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e5-4627_v4:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e5-4627_v4:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-160-0-0-0","id":"15655623","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-160-0-1","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e5-4627_v4_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e5-4627_v4_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e5-4627_v4_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-160-0-1-0","id":"15655732","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":161,"dataTestId":"vuln-software-config-161","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-161-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-161-0-0","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e5-4628l_v4%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e5-4628l_v4:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e5-4628l_v4:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-161-0-0-0","id":"15655733","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-161-0-1","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e5-4628l_v4_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e5-4628l_v4_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e5-4628l_v4_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-161-0-1-0","id":"15655624","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":162,"dataTestId":"vuln-software-config-162","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-162-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-162-0-0","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e5-4640_v4%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e5-4640_v4:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e5-4640_v4:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-162-0-0-0","id":"15655625","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-162-0-1","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e5-4640_v4_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e5-4640_v4_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e5-4640_v4_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-162-0-1-0","id":"15655734","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":163,"dataTestId":"vuln-software-config-163","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-163-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-163-0-0","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e5-4650_v4%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e5-4650_v4:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e5-4650_v4:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-163-0-0-0","id":"15655735","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-163-0-1","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e5-4650_v4_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e5-4650_v4_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e5-4650_v4_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-163-0-1-0","id":"15655626","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":164,"dataTestId":"vuln-software-config-164","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-164-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-164-0-0","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e5-4655_v4%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e5-4655_v4:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e5-4655_v4:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-164-0-0-0","id":"15655627","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-164-0-1","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e5-4655_v4_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e5-4655_v4_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e5-4655_v4_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-164-0-1-0","id":"15655736","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":165,"dataTestId":"vuln-software-config-165","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-165-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-165-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e5-4660_v4_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e5-4660_v4_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e5-4660_v4_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-165-0-0-0","id":"15655628","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-165-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e5-4660_v4%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e5-4660_v4:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e5-4660_v4:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-165-0-1-0","id":"15655737","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":166,"dataTestId":"vuln-software-config-166","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-166-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-166-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e5-4667_v4_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e5-4667_v4_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e5-4667_v4_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-166-0-0-0","id":"15655738","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-166-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e5-4667_v4%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e5-4667_v4:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e5-4667_v4:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-166-0-1-0","id":"15655629","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":167,"dataTestId":"vuln-software-config-167","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-167-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-167-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e5-4669_v4_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e5-4669_v4_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e5-4669_v4_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-167-0-0-0","id":"15655630","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-167-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e5-4669_v4%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e5-4669_v4:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e5-4669_v4:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-167-0-1-0","id":"15655739","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":168,"dataTestId":"vuln-software-config-168","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-168-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-168-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e5-1620_v4_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e5-1620_v4_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e5-1620_v4_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-168-0-0-0","id":"15655740","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-168-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e5-1620_v4%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e5-1620_v4:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e5-1620_v4:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-168-0-1-0","id":"15655631","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":169,"dataTestId":"vuln-software-config-169","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-169-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-169-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e5-1630_v4_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e5-1630_v4_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e5-1630_v4_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-169-0-0-0","id":"15655632","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-169-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e5-1630_v4%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e5-1630_v4:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e5-1630_v4:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-169-0-1-0","id":"15655741","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":170,"dataTestId":"vuln-software-config-170","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-170-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-170-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e5-1650_v4_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e5-1650_v4_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e5-1650_v4_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-170-0-0-0","id":"15655742","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-170-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e5-1650_v4%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e5-1650_v4:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e5-1650_v4:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-170-0-1-0","id":"15655633","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":171,"dataTestId":"vuln-software-config-171","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-171-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-171-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e5-1660_v4_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e5-1660_v4_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e5-1660_v4_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-171-0-0-0","id":"15655634","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-171-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e5-1660_v4%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e5-1660_v4:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e5-1660_v4:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-171-0-1-0","id":"15655743","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":172,"dataTestId":"vuln-software-config-172","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-172-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-172-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e5-1680_v4_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e5-1680_v4_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e5-1680_v4_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-172-0-0-0","id":"15655744","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-172-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e5-1680_v4%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e5-1680_v4:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e5-1680_v4:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-172-0-1-0","id":"15655635","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":173,"dataTestId":"vuln-software-config-173","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-173-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-173-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e5-2603_v4_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e5-2603_v4_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e5-2603_v4_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-173-0-0-0","id":"15655636","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-173-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e5-2603_v4%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e5-2603_v4:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e5-2603_v4:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-173-0-1-0","id":"15655745","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":174,"dataTestId":"vuln-software-config-174","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-174-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-174-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e5-2608l_v4_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e5-2608l_v4_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e5-2608l_v4_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-174-0-0-0","id":"15655746","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-174-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e5-2608l_v4%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e5-2608l_v4:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e5-2608l_v4:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-174-0-1-0","id":"15655637","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":175,"dataTestId":"vuln-software-config-175","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-175-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-175-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e5-2609_v4_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e5-2609_v4_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e5-2609_v4_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-175-0-0-0","id":"15655638","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-175-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e5-2609_v4%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e5-2609_v4:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e5-2609_v4:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-175-0-1-0","id":"15655747","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":176,"dataTestId":"vuln-software-config-176","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-176-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-176-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e5-2618l_v4_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e5-2618l_v4_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e5-2618l_v4_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-176-0-0-0","id":"15655748","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-176-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e5-2618l_v4%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e5-2618l_v4:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e5-2618l_v4:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-176-0-1-0","id":"15655639","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":177,"dataTestId":"vuln-software-config-177","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-177-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-177-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e5-2620_v4_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e5-2620_v4_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e5-2620_v4_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-177-0-0-0","id":"15655640","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-177-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e5-2620_v4%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e5-2620_v4:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e5-2620_v4:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-177-0-1-0","id":"15655749","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":178,"dataTestId":"vuln-software-config-178","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-178-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-178-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e5-2623_v4_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e5-2623_v4_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e5-2623_v4_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-178-0-0-0","id":"15655750","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-178-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e5-2623_v4%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e5-2623_v4:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e5-2623_v4:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-178-0-1-0","id":"15655641","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":179,"dataTestId":"vuln-software-config-179","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-179-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-179-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e5-2628l_v4_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e5-2628l_v4_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e5-2628l_v4_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-179-0-0-0","id":"15655642","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-179-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e5-2628l_v4%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e5-2628l_v4:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e5-2628l_v4:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-179-0-1-0","id":"15655751","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":180,"dataTestId":"vuln-software-config-180","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-180-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-180-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e5-2630_v4_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e5-2630_v4_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e5-2630_v4_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-180-0-0-0","id":"15655752","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-180-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e5-2630_v4%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e5-2630_v4:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e5-2630_v4:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-180-0-1-0","id":"15655643","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":181,"dataTestId":"vuln-software-config-181","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-181-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-181-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e5-2630l_v4_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e5-2630l_v4_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e5-2630l_v4_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-181-0-0-0","id":"15655644","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-181-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e5-2630l_v4%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e5-2630l_v4:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e5-2630l_v4:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-181-0-1-0","id":"15655753","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":182,"dataTestId":"vuln-software-config-182","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-182-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-182-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e5-2637_v4_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e5-2637_v4_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e5-2637_v4_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-182-0-0-0","id":"15655754","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-182-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e5-2637_v4%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e5-2637_v4:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e5-2637_v4:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-182-0-1-0","id":"15655645","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":183,"dataTestId":"vuln-software-config-183","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-183-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-183-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e5-2640_v4_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e5-2640_v4_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e5-2640_v4_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-183-0-0-0","id":"15655646","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-183-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e5-2640_v4%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e5-2640_v4:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e5-2640_v4:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-183-0-1-0","id":"15655755","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":184,"dataTestId":"vuln-software-config-184","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-184-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-184-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e5-2643_v4_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e5-2643_v4_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e5-2643_v4_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-184-0-0-0","id":"15655756","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-184-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e5-2643_v4%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e5-2643_v4:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e5-2643_v4:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-184-0-1-0","id":"15655647","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":185,"dataTestId":"vuln-software-config-185","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-185-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-185-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e5-2648l_v4_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e5-2648l_v4_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e5-2648l_v4_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-185-0-0-0","id":"15655648","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-185-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e5-2648l_v4%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e5-2648l_v4:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e5-2648l_v4:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-185-0-1-0","id":"15655757","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":186,"dataTestId":"vuln-software-config-186","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-186-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-186-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e5-2650_v4_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e5-2650_v4_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e5-2650_v4_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-186-0-0-0","id":"15655758","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-186-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e5-2650_v4%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e5-2650_v4:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e5-2650_v4:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-186-0-1-0","id":"15655649","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":187,"dataTestId":"vuln-software-config-187","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-187-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-187-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e5-2650l_v4_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e5-2650l_v4_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e5-2650l_v4_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-187-0-0-0","id":"15655650","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-187-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e5-2650l_v4%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e5-2650l_v4:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e5-2650l_v4:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-187-0-1-0","id":"15655759","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":188,"dataTestId":"vuln-software-config-188","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-188-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-188-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e5-2658_v4_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e5-2658_v4_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e5-2658_v4_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-188-0-0-0","id":"15655760","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-188-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e5-2658_v4%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e5-2658_v4:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e5-2658_v4:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-188-0-1-0","id":"15655651","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":189,"dataTestId":"vuln-software-config-189","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-189-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-189-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e5-2660_v4_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e5-2660_v4_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e5-2660_v4_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-189-0-0-0","id":"15655652","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-189-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e5-2660_v4%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e5-2660_v4:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e5-2660_v4:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-189-0-1-0","id":"15655761","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":190,"dataTestId":"vuln-software-config-190","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-190-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-190-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e5-2667_v4_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e5-2667_v4_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e5-2667_v4_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-190-0-0-0","id":"15655762","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-190-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e5-2667_v4%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e5-2667_v4:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e5-2667_v4:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-190-0-1-0","id":"15655653","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":191,"dataTestId":"vuln-software-config-191","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-191-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-191-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e5-2680_v4_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e5-2680_v4_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e5-2680_v4_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-191-0-0-0","id":"15655654","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-191-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e5-2680_v4%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e5-2680_v4:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e5-2680_v4:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-191-0-1-0","id":"15655763","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":192,"dataTestId":"vuln-software-config-192","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-192-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-192-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e5-2683_v4_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e5-2683_v4_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e5-2683_v4_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-192-0-0-0","id":"15655764","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-192-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e5-2683_v4%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e5-2683_v4:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e5-2683_v4:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-192-0-1-0","id":"15655655","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":193,"dataTestId":"vuln-software-config-193","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-193-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-193-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e5-2687w_v4_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e5-2687w_v4_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e5-2687w_v4_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-193-0-0-0","id":"15655656","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-193-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e5-2687w_v4%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e5-2687w_v4:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e5-2687w_v4:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-193-0-1-0","id":"15655809","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":194,"dataTestId":"vuln-software-config-194","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-194-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-194-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e5-2690_v4_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e5-2690_v4_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e5-2690_v4_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-194-0-0-0","id":"15655808","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-194-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e5-2690_v4%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e5-2690_v4:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e5-2690_v4:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-194-0-1-0","id":"15655657","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":195,"dataTestId":"vuln-software-config-195","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-195-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-195-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e5-2695_v4_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e5-2695_v4_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e5-2695_v4_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-195-0-0-0","id":"15655658","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-195-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e5-2695_v4%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e5-2695_v4:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e5-2695_v4:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-195-0-1-0","id":"15655807","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":196,"dataTestId":"vuln-software-config-196","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-196-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-196-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e5-2697_v4_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e5-2697_v4_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e5-2697_v4_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-196-0-0-0","id":"15655806","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-196-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e5-2697_v4%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e5-2697_v4:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e5-2697_v4:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-196-0-1-0","id":"15655659","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":197,"dataTestId":"vuln-software-config-197","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-197-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-197-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e5-2697a_v4_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e5-2697a_v4_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e5-2697a_v4_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-197-0-0-0","id":"15655660","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-197-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e5-2697a_v4%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e5-2697a_v4:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e5-2697a_v4:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-197-0-1-0","id":"15655805","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":198,"dataTestId":"vuln-software-config-198","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-198-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-198-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e5-2698_v4_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e5-2698_v4_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e5-2698_v4_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-198-0-0-0","id":"15655804","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-198-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e5-2698_v4%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e5-2698_v4:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e5-2698_v4:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-198-0-1-0","id":"15655661","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":199,"dataTestId":"vuln-software-config-199","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-199-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-199-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e5-2699_v4_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e5-2699_v4_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e5-2699_v4_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-199-0-0-0","id":"15655662","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-199-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e5-2699_v4%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e5-2699_v4:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e5-2699_v4:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-199-0-1-0","id":"15655803","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":200,"dataTestId":"vuln-software-config-200","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-200-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-200-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i9-10900x_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i9-10900x_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i9-10900x_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-200-0-0-0","id":"15655802","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-200-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i9-10900x%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i9-10900x:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i9-10900x:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-200-0-1-0","id":"15655663","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":201,"dataTestId":"vuln-software-config-201","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-201-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-201-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i9-10920x_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i9-10920x_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i9-10920x_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-201-0-0-0","id":"15655664","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-201-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i9-10920x%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i9-10920x:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i9-10920x:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-201-0-1-0","id":"15655801","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":202,"dataTestId":"vuln-software-config-202","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-202-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-202-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i9-10940x_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i9-10940x_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i9-10940x_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-202-0-0-0","id":"15655800","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-202-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i9-10940x%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i9-10940x:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i9-10940x:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-202-0-1-0","id":"15655665","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":203,"dataTestId":"vuln-software-config-203","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-203-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-203-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i9-10980xe_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i9-10980xe_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i9-10980xe_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-203-0-0-0","id":"15655666","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-203-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i9-10980xe%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i9-10980xe:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i9-10980xe:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-203-0-1-0","id":"15655799","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":204,"dataTestId":"vuln-software-config-204","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-204-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-204-0-0","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i7-9800x%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i7-9800x:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i7-9800x:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-204-0-0-0","id":"15655667","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-204-0-1","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i7-9800x_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i7-9800x_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i7-9800x_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-204-0-1-0","id":"15655798","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":205,"dataTestId":"vuln-software-config-205","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-205-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-205-0-0","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i9-9820x%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i9-9820x:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i9-9820x:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-205-0-0-0","id":"15655797","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-205-0-1","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i9-9820x_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i9-9820x_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i9-9820x_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-205-0-1-0","id":"15655668","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":206,"dataTestId":"vuln-software-config-206","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-206-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-206-0-0","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i9-9900x%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i9-9900x:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i9-9900x:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-206-0-0-0","id":"15655669","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-206-0-1","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i9-9900x_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i9-9900x_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i9-9900x_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-206-0-1-0","id":"15655796","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":207,"dataTestId":"vuln-software-config-207","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-207-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-207-0-0","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i9-9920x%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i9-9920x:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i9-9920x:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-207-0-0-0","id":"15655795","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-207-0-1","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i9-9920x_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i9-9920x_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i9-9920x_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-207-0-1-0","id":"15655670","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":208,"dataTestId":"vuln-software-config-208","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-208-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-208-0-0","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i9-9940x%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i9-9940x:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i9-9940x:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-208-0-0-0","id":"15655671","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-208-0-1","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i9-9940x_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i9-9940x_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i9-9940x_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-208-0-1-0","id":"15655794","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":209,"dataTestId":"vuln-software-config-209","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-209-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-209-0-0","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i9-9960x%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i9-9960x:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i9-9960x:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-209-0-0-0","id":"15655793","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-209-0-1","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i9-9960x_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i9-9960x_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i9-9960x_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-209-0-1-0","id":"15655672","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":210,"dataTestId":"vuln-software-config-210","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-210-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-210-0-0","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i9-9980xe%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i9-9980xe:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i9-9980xe:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-210-0-0-0","id":"15655673","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-210-0-1","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i9-9980xe_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i9-9980xe_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i9-9980xe_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-210-0-1-0","id":"15655792","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":211,"dataTestId":"vuln-software-config-211","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-211-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-211-0-0","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i9-7940x%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i9-7940x:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i9-7940x:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-211-0-0-0","id":"15655791","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-211-0-1","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i9-7940x_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i9-7940x_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i9-7940x_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-211-0-1-0","id":"15655674","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":212,"dataTestId":"vuln-software-config-212","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-212-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-212-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i9-7960x_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i9-7960x_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i9-7960x_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-212-0-0-0","id":"15655790","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-212-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i9-7960x%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i9-7960x:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i9-7960x:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-212-0-1-0","id":"15655675","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":213,"dataTestId":"vuln-software-config-213","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-213-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-213-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i9-7980xe_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i9-7980xe_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i9-7980xe_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-213-0-0-0","id":"15655676","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-213-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i9-7980xe%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i9-7980xe:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i9-7980xe:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-213-0-1-0","id":"15655789","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":214,"dataTestId":"vuln-software-config-214","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-214-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-214-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i9-7920x_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i9-7920x_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i9-7920x_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-214-0-0-0","id":"15655788","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-214-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i9-7920x%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i9-7920x:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i9-7920x:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-214-0-1-0","id":"15655677","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":215,"dataTestId":"vuln-software-config-215","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-215-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-215-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i5-7640x_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i5-7640x_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i5-7640x_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-215-0-0-0","id":"15655678","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-215-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i5-7640x%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i5-7640x:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i5-7640x:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-215-0-1-0","id":"15655787","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":216,"dataTestId":"vuln-software-config-216","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-216-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-216-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i7-7740x_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i7-7740x_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i7-7740x_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-216-0-0-0","id":"15655786","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-216-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i7-7740x%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i7-7740x:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i7-7740x:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-216-0-1-0","id":"15655679","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":217,"dataTestId":"vuln-software-config-217","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-217-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-217-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i7-7800x_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i7-7800x_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i7-7800x_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-217-0-0-0","id":"15655680","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-217-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i7-7800x%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i7-7800x:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i7-7800x:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-217-0-1-0","id":"15655765","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":218,"dataTestId":"vuln-software-config-218","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-218-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-218-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i7-7820x_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i7-7820x_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i7-7820x_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-218-0-0-0","id":"15655766","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-218-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i7-7820x%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i7-7820x:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i7-7820x:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-218-0-1-0","id":"15655681","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":219,"dataTestId":"vuln-software-config-219","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-219-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-219-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i9-7900x_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i9-7900x_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i9-7900x_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-219-0-0-0","id":"15655682","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-219-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i9-7900x%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i9-7900x:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i9-7900x:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-219-0-1-0","id":"15655767","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":220,"dataTestId":"vuln-software-config-220","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-220-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-220-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i7-6800k_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i7-6800k_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i7-6800k_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-220-0-0-0","id":"15655768","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-220-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i7-6800k%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i7-6800k:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i7-6800k:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-220-0-1-0","id":"15655683","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":221,"dataTestId":"vuln-software-config-221","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-221-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-221-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i7-6850k_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i7-6850k_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i7-6850k_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-221-0-0-0","id":"15655684","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-221-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i7-6850k%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i7-6850k:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i7-6850k:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-221-0-1-0","id":"15655769","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":222,"dataTestId":"vuln-software-config-222","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-222-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-222-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i7-6900k_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i7-6900k_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i7-6900k_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-222-0-0-0","id":"15655770","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-222-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i7-6900k%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i7-6900k:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i7-6900k:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-222-0-1-0","id":"15655685","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":223,"dataTestId":"vuln-software-config-223","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-223-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-223-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i7-6950x_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i7-6950x_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i7-6950x_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-223-0-0-0","id":"15655686","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-223-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i7-6950x%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i7-6950x:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i7-6950x:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-223-0-1-0","id":"15655771","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":224,"dataTestId":"vuln-software-config-224","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-224-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-224-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i7-5820k_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i7-5820k_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i7-5820k_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-224-0-0-0","id":"15655772","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-224-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i7-5820k%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i7-5820k:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i7-5820k:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-224-0-1-0","id":"15655687","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":225,"dataTestId":"vuln-software-config-225","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-225-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-225-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i7-5930k_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i7-5930k_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i7-5930k_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-225-0-0-0","id":"15655688","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-225-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i7-5930k%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i7-5930k:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i7-5930k:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-225-0-1-0","id":"15655773","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":226,"dataTestId":"vuln-software-config-226","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-226-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-226-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i7-5960x_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i7-5960x_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i7-5960x_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-226-0-0-0","id":"15655774","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-226-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i7-5960x%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i7-5960x:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i7-5960x:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-226-0-1-0","id":"15655689","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":227,"dataTestId":"vuln-software-config-227","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-227-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-227-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i7-4940mx_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i7-4940mx_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i7-4940mx_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-227-0-0-0","id":"15655690","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-227-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i7-4940mx%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i7-4940mx:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i7-4940mx:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-227-0-1-0","id":"15655775","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":228,"dataTestId":"vuln-software-config-228","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-228-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-228-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i7-4820k_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i7-4820k_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i7-4820k_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-228-0-0-0","id":"15655776","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-228-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i7-4820k%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i7-4820k:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i7-4820k:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-228-0-1-0","id":"15655691","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":229,"dataTestId":"vuln-software-config-229","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-229-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-229-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i7-4930k_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i7-4930k_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i7-4930k_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-229-0-0-0","id":"15655692","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-229-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i7-4930k%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i7-4930k:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i7-4930k:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-229-0-1-0","id":"15655777","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":230,"dataTestId":"vuln-software-config-230","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-230-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-230-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i7-4960x_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i7-4960x_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i7-4960x_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-230-0-0-0","id":"15655778","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-230-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i7-4960x%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i7-4960x:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i7-4960x:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-230-0-1-0","id":"15655693","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":231,"dataTestId":"vuln-software-config-231","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-231-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-231-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i7-4930mx_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i7-4930mx_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i7-4930mx_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-231-0-0-0","id":"15655694","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-231-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i7-4930mx%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i7-4930mx:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i7-4930mx:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-231-0-1-0","id":"15655779","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":232,"dataTestId":"vuln-software-config-232","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-232-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-232-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i7-3970x_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i7-3970x_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i7-3970x_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-232-0-0-0","id":"15655780","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-232-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i7-3970x%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i7-3970x:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i7-3970x:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-232-0-1-0","id":"15655695","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":233,"dataTestId":"vuln-software-config-233","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-233-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-233-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i7-3940xm_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i7-3940xm_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i7-3940xm_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-233-0-0-0","id":"15655696","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-233-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i7-3940xm%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i7-3940xm:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i7-3940xm:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-233-0-1-0","id":"15655781","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":234,"dataTestId":"vuln-software-config-234","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-234-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-234-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i7-3920xm_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i7-3920xm_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i7-3920xm_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-234-0-0-0","id":"15655782","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-234-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i7-3920xm%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i7-3920xm:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i7-3920xm:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-234-0-1-0","id":"15655697","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":235,"dataTestId":"vuln-software-config-235","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-235-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-235-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i7-3820_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i7-3820_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i7-3820_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-235-0-0-0","id":"15655698","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-235-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i7-3820%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i7-3820:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i7-3820:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-235-0-1-0","id":"15655783","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":236,"dataTestId":"vuln-software-config-236","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-236-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-236-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i7-3930k_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i7-3930k_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i7-3930k_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-236-0-0-0","id":"15655784","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-236-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i7-3930k%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i7-3930k:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i7-3930k:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-236-0-1-0","id":"15655699","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":237,"dataTestId":"vuln-software-config-237","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-237-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-237-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i7-3960x_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i7-3960x_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i7-3960x_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-237-0-0-0","id":"15655700","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-237-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i7-3960x%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i7-3960x:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i7-3960x:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-237-0-1-0","id":"15655785","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]}]"/>
|
||
|
||
<p id="vulnCpeInfo" >
|
||
<small>
|
||
<i class="fa fa-bug fa-flip-vertical"></i> Denotes Vulnerable Software<br />
|
||
<a href="mailto:cpe_dictionary@nist.gov">Are we missing a CPE here? Please let us know</a>.<br />
|
||
|
||
</small>
|
||
</p>
|
||
<script src="/site-media/js/vulnerability/cpe-match.js"
|
||
type="text/javascript"></script>
|
||
<script src="/site-media/js/vulnerability/configurationListing.js"
|
||
type="text/javascript"></script>
|
||
</div>
|
||
</div>
|
||
|
||
<div id="vulnChangeHistoryDiv"
|
||
data-testid="vuln-change-history-container">
|
||
<h3 id="VulnChangeHistorySection">Change History</h3>
|
||
<small> 5 change records found <a href="#VulnChangeHistorySection"
|
||
style="text-decoration: underline" id="changeHistoryToggle">show
|
||
changes</a>
|
||
</small>
|
||
<div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-0">CVE Modified by CVE</span> <span
|
||
data-testid="vuln-change-history-date-0">11/21/2024 2:15:44 AM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">Reference</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00813.html</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">Reference</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">https://security.netapp.com/advisory/ntap-20230824-0001/</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-1">CVE Modified by Intel Corporation</span> <span
|
||
data-testid="vuln-change-history-date-1">5/14/2024 7:14:33 AM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-2">CVE Modified by Intel Corporation</span> <span
|
||
data-testid="vuln-change-history-date-2">11/06/2023 10:50:00 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CWE</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">Intel Corporation CWE-665</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-3">CVE Modified by Intel Corporation</span> <span
|
||
data-testid="vuln-change-history-date-3">8/24/2023 3:15:12 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-3">
|
||
<td
|
||
data-testid="vuln-change-history-3-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-3-type">Reference</td>
|
||
<td data-testid="vuln-change-history-3-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-3-new">
|
||
|
||
<pre style="word-break: break-all !important">https://security.netapp.com/advisory/ntap-20230824-0001/ [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-4">Initial Analysis by NIST</span> <span
|
||
data-testid="vuln-change-history-date-4">8/17/2023 1:49:15 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CVSS V3.1</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">NIST AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CWE</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">NIST CWE-665</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i5-7640x_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i5-7640x:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i7-3820_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i7-3820:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i7-3920xm_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i7-3920xm:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i7-3930k_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i7-3930k:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i7-3940xm_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i7-3940xm:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i7-3960x_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i7-3960x:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i7-3970x_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i7-3970x:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i7-4820k_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i7-4820k:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i7-4930k_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i7-4930k:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i7-4930mx_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i7-4930mx:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i7-4940mx_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i7-4940mx:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i7-4960x_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i7-4960x:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i7-5820k_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i7-5820k:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i7-5930k_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i7-5930k:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i7-5960x_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i7-5960x:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i7-6800k_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i7-6800k:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i7-6850k_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i7-6850k:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i7-6900k_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i7-6900k:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i7-6950x_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i7-6950x:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i7-7740x_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i7-7740x:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i7-7800x_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i7-7800x:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i7-7820x_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i7-7820x:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i7-9800x_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i7-9800x:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i9-10900x_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i9-10900x:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i9-10920x_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i9-10920x:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i9-10940x_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i9-10940x:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i9-10980xe_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i9-10980xe:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i9-7900x_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i9-7900x:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i9-7920x_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i9-7920x:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i9-7940x_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i9-7940x:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i9-7960x_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i9-7960x:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i9-7980xe_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i9-7980xe:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i9-9820x_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i9-9820x:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i9-9900x_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i9-9900x:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i9-9920x_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i9-9920x:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i9-9940x_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i9-9940x:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i9-9960x_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i9-9960x:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i9-9980xe_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i9-9980xe:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1513n_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1513n:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1518_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1518:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1520_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1520:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1521_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1521:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1523n_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1523n:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1527_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1527:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1528_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1528:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1529_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1529:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1531_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1531:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1533n_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1533n:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1537_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1537:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1539_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1539:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1540_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1540:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1541_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1541:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1543n_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1543n:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1548_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1548:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1553n_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1553n:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1557_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1557:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1559_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1559:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1567_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1567:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1571_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1571:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1577_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1577:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1602_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1602:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1622_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1622:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1623n_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1623n:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1627_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1627:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1633n_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1633n:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1637_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1637:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1649n_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1649n:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1653n_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1653n:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1702_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1702:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1712tr_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1712tr:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1713nt_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1713nt:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1713nte_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1713nte:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1714_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1714:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1715ter_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1715ter:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1718t_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1718t:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1722ne_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1722ne:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1726_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1726:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1732te_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1732te:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1733nt_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1733nt:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1734nt_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1734nt:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1735tr_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1735tr:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1736_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1736:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1736nt_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1736nt:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1739_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1739:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1746ter_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1746ter:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1747nte_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1747nte:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1748te_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1748te:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1749nt_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1749nt:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-2123it_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-2123it:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-2141i_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-2141i:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-2142it_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-2142it:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-2143it_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-2143it:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-2145nt_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-2145nt:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-2146nt_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-2146nt:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-2161i_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-2161i:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-2163it_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-2163it:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-2166nt_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-2166nt:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-2173it_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-2173it:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-2177nt_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-2177nt:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-2183it_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-2183it:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-2187nt_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-2187nt:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-2712t_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-2712t:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-2733nt_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-2733nt:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-2738_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-2738:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-2745nx_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-2745nx:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-2752nte_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-2752nte:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-2752ter_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-2752ter:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-2753nt_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-2753nt:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-2757nx_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-2757nx:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-2766nt_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-2766nt:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-2775te_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-2775te:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-2776nt_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-2776nt:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-2777nx_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-2777nx:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-2779_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-2779:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-2786nte_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-2786nte:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-2795nt_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-2795nt:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-2796nt_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-2796nt:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-2796te_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-2796te:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-2798nt_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-2798nt:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-2798nx_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-2798nx:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-2799_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-2799:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e5-1428l_v3_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e5-1428l_v3:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e5-1620_v3_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e5-1620_v3:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e5-1620_v4_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e5-1620_v4:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e5-1630_v3_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e5-1630_v3:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e5-1630_v4_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e5-1630_v4:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e5-1650_v3_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e5-1650_v3:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e5-1650_v4_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e5-1650_v4:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e5-1660_v3_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e5-1660_v3:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e5-1660_v4_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e5-1660_v4:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e5-1680_v3_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e5-1680_v3:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e5-1680_v4_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e5-1680_v4:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e5-2408l_v3_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e5-2408l_v3:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e5-2418l_v3_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e5-2418l_v3:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e5-2428l_v3_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e5-2428l_v3:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e5-2438l_v3_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e5-2438l_v3:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e5-2603_v3_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e5-2603_v3:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e5-2603_v4_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e5-2603_v4:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e5-2608l_v3_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e5-2608l_v3:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e5-2608l_v4_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e5-2608l_v4:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e5-2609_v3_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e5-2609_v3:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e5-2609_v4_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e5-2609_v4:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e5-2618l_v3_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e5-2618l_v3:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e5-2618l_v4_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e5-2618l_v4:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e5-2620_v3_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e5-2620_v3:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e5-2620_v4_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e5-2620_v4:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e5-2623_v3_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e5-2623_v3:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e5-2623_v4_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e5-2623_v4:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e5-2628l_v3_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e5-2628l_v3:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e5-2628l_v4_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e5-2628l_v4:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e5-2630_v3_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e5-2630_v3:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e5-2630_v4_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e5-2630_v4:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e5-2630l_v3_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e5-2630l_v3:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e5-2630l_v4_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e5-2630l_v4:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e5-2637_v3_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e5-2637_v3:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e5-2637_v4_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e5-2637_v4:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e5-2640_v3_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e5-2640_v3:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e5-2640_v4_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e5-2640_v4:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e5-2643_v3_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e5-2643_v3:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e5-2643_v4_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e5-2643_v4:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e5-2648l_v3_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e5-2648l_v3:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e5-2648l_v4_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e5-2648l_v4:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e5-2650_v3_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e5-2650_v3:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e5-2650_v4_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e5-2650_v4:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e5-2650l_v3_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e5-2650l_v3:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e5-2650l_v4_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e5-2650l_v4:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e5-2658_v3_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e5-2658_v3:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e5-2658_v4_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e5-2658_v4:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e5-2658a_v3_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e5-2658a_v3:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e5-2660_v3_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e5-2660_v3:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e5-2660_v4_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e5-2660_v4:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e5-2667_v3_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e5-2667_v3:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e5-2667_v4_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e5-2667_v4:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e5-2670_v3_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e5-2670_v3:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e5-2680_v3_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e5-2680_v3:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e5-2680_v4_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e5-2680_v4:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e5-2683_v3_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e5-2683_v3:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e5-2683_v4_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e5-2683_v4:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e5-2687w_v3_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e5-2687w_v3:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e5-2687w_v4_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e5-2687w_v4:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e5-2690_v3_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e5-2690_v3:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e5-2690_v4_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e5-2690_v4:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e5-2695_v3_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e5-2695_v3:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e5-2695_v4_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e5-2695_v4:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e5-2697_v3_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e5-2697_v3:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e5-2697_v4_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e5-2697_v4:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e5-2697a_v4_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e5-2697a_v4:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e5-2698_v3_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e5-2698_v3:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e5-2698_v4_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e5-2698_v4:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e5-2699_v3_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e5-2699_v3:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e5-2699_v4_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e5-2699_v4:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e5-2699a_v4_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e5-2699a_v4:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e5-2699r_v4_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e5-2699r_v4:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e5-4610_v3_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e5-4610_v3:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e5-4610_v4_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e5-4610_v4:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e5-4620_v3_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e5-4620_v3:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e5-4620_v4_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e5-4620_v4:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e5-4627_v3_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e5-4627_v3:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e5-4627_v4_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e5-4627_v4:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e5-4628l_v4_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e5-4628l_v4:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e5-4640_v3_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e5-4640_v3:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e5-4640_v4_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e5-4640_v4:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e5-4648_v3_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e5-4648_v3:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e5-4650_v3_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e5-4650_v3:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e5-4650_v4_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e5-4650_v4:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e5-4655_v3_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e5-4655_v3:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e5-4655_v4_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e5-4655_v4:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e5-4660_v3_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e5-4660_v3:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e5-4660_v4_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e5-4660_v4:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e5-4667_v3_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e5-4667_v3:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e5-4667_v4_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e5-4667_v4:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e5-4669_v3_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e5-4669_v3:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e5-4669_v4_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e5-4669_v4:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e7-4809_v3_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e7-4809_v3:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e7-4809_v4_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e7-4809_v4:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e7-4820_v3_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e7-4820_v3:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e7-4820_v4_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e7-4820_v4:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e7-4830_v3_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e7-4830_v3:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e7-4830_v4_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e7-4830_v4:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e7-4850_v3_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e7-4850_v3:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e7-4850_v4_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e7-4850_v4:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e7-8860_v3_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e7-8860_v3:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e7-8860_v4_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e7-8860_v4:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e7-8867_v3_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e7-8867_v3:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e7-8867_v4_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e7-8867_v4:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e7-8870_v3_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e7-8870_v3:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e7-8870_v4_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e7-8870_v4:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e7-8880_v3_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e7-8880_v3:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e7-8880_v4_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e7-8880_v4:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e7-8880l_v3_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e7-8880l_v3:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e7-8890_v3_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e7-8890_v3:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e7-8890_v4_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e7-8890_v4:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e7-8891_v3_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e7-8891_v3:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e7-8891_v4_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e7-8891_v4:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e7-8893_v3_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e7-8893_v3:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e7-8893_v4_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e7-8893_v4:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e7-8894_v4_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e7-8894_v4:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00813.html No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00813.html Vendor Advisory</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
</div>
|
||
|
||
</div>
|
||
|
||
</div>
|
||
</div>
|
||
|
||
|
||
<div class="col-lg-3 col-md-5 col-sm-12">
|
||
|
||
<div class="bs-callout bs-callout-info">
|
||
<h4>Quick Info</h4>
|
||
<strong>CVE Dictionary Entry:</strong><br/> <a
|
||
target="_blank" rel="noopener noreferrer" data-testid="vuln-cve-dictionary-entry"
|
||
href="https://cve.org/CVERecord?id=CVE-2022-38083">CVE-2022-38083</a><br/> <strong>NVD
|
||
Published Date:</strong><br/> <span
|
||
data-testid="vuln-published-on">08/10/2023</span><br/> <strong>NVD
|
||
Last Modified:</strong><br/> <span
|
||
data-testid="vuln-last-modified-on">11/21/2024</span><br/> <strong>
|
||
Source:</strong><br/> <span
|
||
data-testid="vuln-current-description-source">Intel Corporation</span><br/>
|
||
</div>
|
||
|
||
</div>
|
||
|
||
</div>
|
||
|
||
</td>
|
||
</tr>
|
||
</table>
|
||
|
||
</div>
|
||
<!-- Hidden input for padding -->
|
||
<input type="hidden" value="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" id="padding" name="padding"/>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
</main>
|
||
<footer id="footer" role="contentinfo">
|
||
<div class="container">
|
||
|
||
<div class="row">
|
||
<div class="col-sm-12">
|
||
<ul class="social-list pull-right">
|
||
<li class="field-item service-twitter list-horiz"><a
|
||
href="https://twitter.com/NISTCyber" target="_blank" rel="noopener noreferrer"
|
||
class="social-btn social-btn--large extlink ext"> <i
|
||
class="fa fa-twitter fa-fw"><span class="element-invisible">twitter</span></i><span
|
||
class="ext"><span class="element-invisible"> (link
|
||
is external)</span></span>
|
||
</a></li>
|
||
<li class="field-item service-facebook list-horiz"><a
|
||
href="https://www.facebook.com/NIST" target="_blank" rel="noopener noreferrer"
|
||
class="social-btn social-btn--large extlink ext"> <i
|
||
class="fa fa-facebook fa-fw"><span class="element-invisible">facebook</span></i><span
|
||
class="ext"><span class="element-invisible"> (link
|
||
is external)</span></span></a></li>
|
||
<li class="field-item service-linkedin list-horiz"><a
|
||
href="https://www.linkedin.com/company/nist" target="_blank" rel="noopener noreferrer"
|
||
class="social-btn social-btn--large extlink ext"> <i
|
||
class="fa fa-linkedin fa-fw"><span class="element-invisible">linkedin</span></i><span
|
||
class="ext"><span class="element-invisible"> (link
|
||
is external)</span></span></a></li>
|
||
<li class="field-item service-youtube list-horiz"><a
|
||
href="https://www.youtube.com/user/USNISTGOV" target="_blank" rel="noopener noreferrer"
|
||
class="social-btn social-btn--large extlink ext"> <i
|
||
class="fa fa-youtube fa-fw"><span class="element-invisible">youtube</span></i><span
|
||
class="ext"><span class="element-invisible"> (link
|
||
is external)</span></span></a></li>
|
||
<li class="field-item service-rss list-horiz"><a
|
||
href="https://www.nist.gov/news-events/nist-rss-feeds"
|
||
target="_blank" rel="noopener noreferrer" class="social-btn social-btn--large extlink">
|
||
<i class="fa fa-rss fa-fw"><span class="element-invisible">rss</span></i>
|
||
</a></li>
|
||
<li class="field-item service-govdelivery list-horiz last"><a
|
||
href="https://public.govdelivery.com/accounts/USNIST/subscriber/new?qsp=USNIST_3"
|
||
target="_blank" rel="noopener noreferrer" class="social-btn social-btn--large extlink ext">
|
||
<i class="fa fa-envelope fa-fw"><span
|
||
class="element-invisible">govdelivery</span></i><span class="ext"><span
|
||
class="element-invisible"> (link is external)</span></span>
|
||
</a></li>
|
||
</ul>
|
||
<span class="hidden-xs"> <a
|
||
title="National Institute of Standards and Technology" rel="home"
|
||
class="footer-nist-logo"> <img
|
||
src="/site-media/images/nist/nist-logo.png"
|
||
alt="National Institute of Standards and Technology logo" />
|
||
</a>
|
||
</span>
|
||
</div>
|
||
</div>
|
||
<div class="row hidden-sm hidden-md hidden-lg">
|
||
<div class="col-sm-12">
|
||
<a href="https://www.nist.gov"
|
||
title="National Institute of Standards and Technology" rel="home"
|
||
target="_blank" rel="noopener noreferrer" class="footer-nist-logo"> <img
|
||
src="/site-media/images/nist/nist-logo.png"
|
||
alt="National Institute of Standards and Technology logo" />
|
||
</a>
|
||
</div>
|
||
</div>
|
||
|
||
<div class="row footer-contact-container">
|
||
<div class="col-sm-6">
|
||
<strong>HEADQUARTERS</strong>
|
||
<br>
|
||
100 Bureau Drive
|
||
<br>
|
||
Gaithersburg, MD 20899
|
||
<br>
|
||
<a href="tel:301-975-2000">(301) 975-2000</a>
|
||
<br>
|
||
<br>
|
||
<a href="mailto:nvd@nist.gov">Webmaster</a> | <a
|
||
href="https://www.nist.gov/about-nist/contact-us">Contact Us</a>
|
||
| <a href="https://www.nist.gov/about-nist/visit"
|
||
style="display: inline-block;">Our Other Offices</a>
|
||
</div>
|
||
<div class="col-sm-6">
|
||
<div class="pull-right"
|
||
style="text-align:right">
|
||
<strong>Incident Response Assistance and Non-NVD Related<br>Technical Cyber Security Questions:</strong>
|
||
<br>
|
||
US-CERT Security Operations Center
|
||
<br> Email: <a href="mailto:soc@us-cert.gov">soc@us-cert.gov</a>
|
||
<br> Phone: 1-888-282-0870
|
||
</div>
|
||
</div>
|
||
</div>
|
||
|
||
<div class="row">
|
||
<nav title="Footer Navigation" role="navigation"
|
||
class="row footer-bottom-links-container">
|
||
<!-- https://github.com/usnistgov/nist-header-footer/blob/nist-pages/boilerplate-footer.html -->
|
||
<p>
|
||
<a href="https://www.nist.gov/oism/site-privacy">Site Privacy</a>
|
||
|
|
||
<a href="https://www.nist.gov/oism/accessibility">Accessibility</a>
|
||
|
|
||
<a href="https://www.nist.gov/privacy">Privacy Program</a>
|
||
|
|
||
<a href="https://www.nist.gov/oism/copyrights">Copyrights</a>
|
||
|
|
||
<a href="https://www.commerce.gov/vulnerability-disclosure-policy">Vulnerability Disclosure</a>
|
||
|
|
||
<a href="https://www.nist.gov/no-fear-act-policy">No Fear Act Policy</a>
|
||
|
|
||
<a href="https://www.nist.gov/foia">FOIA</a>
|
||
|
|
||
<a href="https://www.nist.gov/environmental-policy-statement">Environmental Policy</a>
|
||
|
|
||
<a href="https://www.nist.gov/summary-report-scientific-integrity">Scientific Integrity</a>
|
||
|
|
||
<a href="https://www.nist.gov/nist-information-quality-standards">Information Quality Standards</a>
|
||
|
|
||
<a href="https://www.commerce.gov/">Commerce.gov</a>
|
||
|
|
||
<a href="https://www.science.gov/">Science.gov</a>
|
||
|
|
||
<a href="https://www.usa.gov/">USA.gov</a>
|
||
</p>
|
||
</nav>
|
||
</div>
|
||
</div>
|
||
</footer>
|
||
</body>
|
||
</html>
|
||
|
||
|