15012 lines
1.5 MiB
15012 lines
1.5 MiB
<!DOCTYPE html>
|
||
|
||
<html lang="en">
|
||
<head>
|
||
|
||
|
||
|
||
<title>NVD - CVE-2022-38087</title>
|
||
|
||
<meta http-equiv="content-type" content="text/html; charset=UTF-8" />
|
||
<meta http-equiv="content-style-type" content="text/css" />
|
||
<meta http-equiv="content-script-type" content="text/javascript" />
|
||
<meta name="viewport" content="width=device-width, initial-scale=1.0" />
|
||
|
||
|
||
<link href="/site-scripts/font-awesome/css/font-awesome.min.css"
|
||
type="text/css" rel="stylesheet" />
|
||
<link href="/site-media/bootstrap/css/bootstrap.min.css"
|
||
type="text/css" rel="stylesheet" />
|
||
<link href="/site-media/bootstrap/css/bootstrap-theme.min.css"
|
||
type="text/css" rel="stylesheet" />
|
||
<link
|
||
href="/site-scripts/eonasdan-bootstrap-datetimepicker/build/css/bootstrap-datetimepicker.min.css"
|
||
type="text/css" rel="stylesheet" />
|
||
|
||
|
||
<link href="/site-media/css/nist-fonts.css" type="text/css"
|
||
rel="stylesheet" />
|
||
<link href="/site-media/css/base-style.css" type="text/css"
|
||
rel="stylesheet" />
|
||
<link href="/site-media/css/media-resize.css" type="text/css"
|
||
rel="stylesheet" />
|
||
|
||
|
||
<meta name="theme-color" content="#000000">
|
||
|
||
|
||
<script src="/site-scripts/jquery/dist/jquery.min.js"
|
||
type="text/javascript"></script>
|
||
<script src="/site-scripts/jquery-visible/jquery.visible.min.js"
|
||
type="text/javascript"></script>
|
||
<script src="/site-scripts/underscore/underscore-min.js"
|
||
type="text/javascript"></script>
|
||
<script src="/site-media/bootstrap/js/bootstrap.js"
|
||
type="text/javascript"></script>
|
||
<script src="/site-scripts/moment/min/moment.min.js"
|
||
type="text/javascript"></script>
|
||
<script
|
||
src="/site-scripts/eonasdan-bootstrap-datetimepicker/build/js/bootstrap-datetimepicker.min.js"
|
||
type="text/javascript"></script>
|
||
|
||
|
||
<script src="/site-media/js/megamenu.js" type="text/javascript"></script>
|
||
<script src="/site-media/js/nist-exit-script.js"
|
||
type="text/javascript"></script>
|
||
<script src="/site-media/js/forms.js" type="text/javascript"></script>
|
||
|
||
<script
|
||
src="/site-media/js/federated-analytics.all.min.js?agency=NIST&subagency=nvd&pua=UA-37115410-41&yt=true"
|
||
type="text/javascript" id="_fed_an_js_tag"></script>
|
||
|
||
<!-- Google tag (gtag.js) -->
|
||
<script async src="https://www.googletagmanager.com/gtag/js?id=G-4KKFZP12LQ"></script>
|
||
<script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-4KKFZP12LQ'); </script>
|
||
|
||
|
||
<style id="antiClickjack">
|
||
body>* {
|
||
display: none !important;
|
||
}
|
||
|
||
#antiClickjack {
|
||
display: block !important;
|
||
}
|
||
</style>
|
||
<noscript>
|
||
<style id="antiClickjackNoScript">
|
||
body>* {
|
||
display: block !important;
|
||
}
|
||
|
||
#antiClickjack {
|
||
display: none !important;
|
||
}
|
||
</style>
|
||
</noscript>
|
||
<script type="text/javascript" id="antiClickjackScript">
|
||
if (self === top) {
|
||
// no clickjacking
|
||
var antiClickjack = document.getElementById("antiClickjack");
|
||
antiClickjack.parentNode.removeChild(antiClickjack);
|
||
} else {
|
||
setTimeout(tryForward(), 5000);
|
||
}
|
||
|
||
function tryForward() {
|
||
top.location = self.location;
|
||
}
|
||
</script>
|
||
<meta charset="UTF-8">
|
||
|
||
<link href="/site-media/css/nvd-style.css" type="text/css"
|
||
rel="stylesheet" />
|
||
<link href="/site-media/images/favicons/apple-touch-icon.png"
|
||
rel="apple-touch-icon" type="image/png" sizes="180x180" />
|
||
<link href="/site-media/images/favicons/favicon-32x32.png"
|
||
rel="icon" type="image/png" sizes="32x32" />
|
||
<link href="/site-media/images/favicons/favicon-16x16.png"
|
||
rel="icon" type="image/png" sizes="16x16" />
|
||
<link href="/site-media/images/favicons/manifest.json"
|
||
rel="manifest" />
|
||
<link href="/site-media/images/favicons/safari-pinned-tab.svg"
|
||
rel="mask-icon" color="#000000" />
|
||
<link href="/site-media/images/favicons/favicon.ico"
|
||
rel="shortcut icon" />
|
||
<meta name="msapplication-config" content="/site-media/images/favicons/browserconfig.xml" />
|
||
<link href="/site-media/images/favicons/favicon.ico"
|
||
rel="shortcut icon" type="image/x-icon" />
|
||
<link href="/site-media/images/favicons/favicon.ico" rel="icon"
|
||
type="image/x-icon" />
|
||
<meta charset="UTF-8">
|
||
<script src="/site-media/js/vulnerability/vulnDetail.js"
|
||
type="text/javascript"></script>
|
||
<script src="/site-media/js/vulnerability/cvssVulnDetail.js"
|
||
type="text/javascript"></script>
|
||
|
||
</head>
|
||
<body>
|
||
<header role="banner" title="Site Banner">
|
||
<div id="antiClickjack" style="display: none">
|
||
<h1>You are viewing this page in an unauthorized frame window.</h1>
|
||
<p>
|
||
This is a potential security issue, you are being redirected to
|
||
<a href="https://nvd.nist.gov">https://nvd.nist.gov</a>
|
||
</p>
|
||
</div>
|
||
<div>
|
||
<section class="usa-banner" aria-label="Official government website">
|
||
<div class="usa-accordion container">
|
||
<header class="usa-banner__header">
|
||
<noscript>
|
||
<p style="font-size: 0.85rem; font-weight: bold;">You have JavaScript disabled. This site requires JavaScript to be enabled for complete site functionality.</p>
|
||
</noscript>
|
||
<img class="usa-banner__header-flag"
|
||
src="/site-media/images/usbanner/us_flag_small.png" alt="U.S. flag">
|
||
|
||
<span class="usa-banner__header-text">An official website of the United States government</span>
|
||
|
||
<button id="gov-banner-button" class="usa-accordion__button usa-banner__button" data-toggle="collapse" data-target="#gov-banner" aria-expanded="false" aria-controls="gov-banner">
|
||
<span class="usa-banner__button-text">Here's how you know</span>
|
||
</button>
|
||
</header>
|
||
<div class="usa-banner__content usa-accordion__content collapse" role="tabpanel" id="gov-banner" aria-expanded="true">
|
||
<div class="row">
|
||
<div class="col-md-5 col-sm-12">
|
||
<div class="row">
|
||
<div class="col-sm-2 col-xs-3">
|
||
<img class="usa-banner__icon usa-media-block__img"
|
||
src="/site-media/images/usbanner/icon-dot-gov.svg" alt="Dot gov">
|
||
</div>
|
||
<div class="col-sm-10 col-xs-9">
|
||
<p>
|
||
<strong>Official websites use .gov</strong>
|
||
<br>
|
||
A <strong>.gov</strong> website belongs to an official government organization in the United States.
|
||
</p>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
<div class="col-md-5 col-sm-12">
|
||
<div class="row">
|
||
<div class="col-sm-2 col-xs-3">
|
||
<img class="usa-banner__icon usa-media-block__img"
|
||
src="/site-media/images/usbanner/icon-https.svg" alt="Https">
|
||
</div>
|
||
<div class="col-sm-10 col-xs-9">
|
||
<p>
|
||
<strong>Secure .gov websites use HTTPS</strong>
|
||
<br>
|
||
A <strong>lock</strong> (<img class="usa-banner__lock"
|
||
src="/site-media/images/usbanner/lock.svg" alt="Dot gov">) or <strong>https://</strong> means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.
|
||
</p>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
</section>
|
||
</div>
|
||
<div>
|
||
<div>
|
||
<nav id="navbar" class="navbar">
|
||
<div id="nist-menu-container" class="container">
|
||
<div class="row">
|
||
<!-- Brand -->
|
||
<div class="col-xs-6 col-md-4 navbar-header"
|
||
style="height:104px">
|
||
<a class="navbar-brand"
|
||
href="https://www.nist.gov"
|
||
target="_blank" rel="noopener noreferrer"
|
||
id="navbar-brand-image"
|
||
style="padding-top: 36px">
|
||
|
||
<img alt="National Institute of Standards and Technology"
|
||
src="/site-media/images/nist/nist-logo.svg"
|
||
width="110" height="30">
|
||
</a>
|
||
</div>
|
||
<div class="col-xs-6 col-md-8 navbar-nist-logo">
|
||
<span id="nvd-menu-button" class="pull-right" style="margin-top: 26px"> <a href="#">
|
||
<span class="fa fa-bars"></span> <span id="nvd-menu-full-text"><span
|
||
class="hidden-xxs">NVD </span>MENU</span>
|
||
</a>
|
||
</span>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
|
||
<div class="main-menu-row container">
|
||
<!-- Collect the nav links, forms, and other content for toggling -->
|
||
<div id="main-menu-drop" class="col-lg-12" style="display: none;">
|
||
<ul>
|
||
|
||
<li><a href="/general"> General <span
|
||
class="expander fa fa-plus" id="nvd-header-menu-general"
|
||
data-expander-name="general" data-expanded="false"> <span
|
||
class="element-invisible">Expand or Collapse</span>
|
||
</span>
|
||
</a>
|
||
<div style="display: none;" class="sub-menu"
|
||
data-expander-trigger="general">
|
||
<div class="row">
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/general/nvd-dashboard">NVD Dashboard</a>
|
||
</p>
|
||
<p>
|
||
<a href="https://www.nist.gov/itl/nvd">News and Status Updates</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/general/faq">FAQ</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/general/visualizations">Visualizations</a>
|
||
</p>
|
||
<p>
|
||
<a href="/general/legal-disclaimer">Legal Disclaimer</a>
|
||
</p>
|
||
</div>
|
||
</div>
|
||
</div></li>
|
||
<li><a href="/vuln"> Vulnerabilities <span
|
||
class="expander fa fa-plus"
|
||
id="nvd-header-menu-vulnerabilities"
|
||
data-expander-name="vulnerabilities" data-expanded="false">
|
||
<span class="element-invisible">Expand or Collapse</span>
|
||
</span>
|
||
</a>
|
||
<div style="display: none;" class="sub-menu"
|
||
data-expander-trigger="vulnerabilities">
|
||
<div class="row">
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/vuln/search">Search & Statistics</a>
|
||
</p>
|
||
<p>
|
||
<a href="/vuln/categories">Weakness Types</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/vuln/data-feeds">Legacy Data Feeds</a>
|
||
</p>
|
||
<p>
|
||
<a href="/vuln/vendor-comments">Vendor Comments</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/vuln/cvmap">CVMAP</a>
|
||
</p>
|
||
</div>
|
||
</div>
|
||
</div></li>
|
||
<li><a href="/vuln-metrics/cvss#"> Vulnerability Metrics <span
|
||
class="expander fa fa-plus" id="nvd-header-menu-metrics"
|
||
data-expander-name="metrics" data-expanded="false"> <span
|
||
class="element-invisible">Expand or Collapse</span>
|
||
</span>
|
||
</a>
|
||
<div style="display: none;" class="sub-menu"
|
||
data-expander-trigger="metrics">
|
||
<div class="row">
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/vuln-metrics/cvss/v4-calculator">CVSS v4.0
|
||
Calculators</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/vuln-metrics/cvss/v3-calculator">CVSS v3.x
|
||
Calculators</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/vuln-metrics/cvss/v2-calculator">CVSS v2.0
|
||
Calculator</a>
|
||
</p>
|
||
|
||
</div>
|
||
</div>
|
||
</div></li>
|
||
<li><a href="/products"> Products <span
|
||
class="expander fa fa-plus" id="nvd-header-menu-products"
|
||
data-expander-name="products" data-expanded="false"> <span
|
||
class="element-invisible">Expand or Collapse</span>
|
||
</span>
|
||
</a>
|
||
<div style="display: none;" class="sub-menu"
|
||
data-expander-trigger="products">
|
||
<div class="row">
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/products/cpe">CPE Dictionary</a>
|
||
</p>
|
||
<p>
|
||
<a href="/products/cpe/search">CPE Search</a>
|
||
</p>
|
||
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/products/cpe/statistics">CPE Statistics</a>
|
||
</p>
|
||
<p>
|
||
<a href="/products/swid">SWID</a>
|
||
</p>
|
||
|
||
</div>
|
||
<div class="col-lg-4"></div>
|
||
</div>
|
||
</div></li>
|
||
<li>
|
||
<a href="/developers">Developers<span
|
||
class="expander fa fa-plus" id="nvd-header-menu-developers"
|
||
data-expander-name="developers" data-expanded="false"> <span
|
||
class="element-invisible">Expand or Collapse</span>
|
||
</span>
|
||
</a>
|
||
<div style="display: none;" class="sub-menu"
|
||
data-expander-trigger="developers">
|
||
<div class="row">
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/developers/start-here">Start Here</a>
|
||
</p>
|
||
<p>
|
||
<a href="/developers/request-an-api-key">Request an API Key</a>
|
||
</p>
|
||
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/developers/vulnerabilities">Vulnerabilities</a>
|
||
</p>
|
||
<p>
|
||
<a href="/developers/products">Products</a>
|
||
</p>
|
||
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/developers/data-sources">Data Sources</a>
|
||
</p>
|
||
<p>
|
||
<a href="/developers/terms-of-use">Terms of Use</a>
|
||
</p>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
</li>
|
||
<li><a href="/contact"> Contact NVD </a></li>
|
||
<li><a href="/other"> Other Sites <span
|
||
class="expander fa fa-plus" id="nvd-header-menu-othersites"
|
||
data-expander-name="otherSites" data-expanded="false"> <span
|
||
class="element-invisible">Expand or Collapse</span>
|
||
</span>
|
||
</a>
|
||
<div style="display: none;" class="sub-menu"
|
||
data-expander-trigger="otherSites">
|
||
<div class="row">
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="https://ncp.nist.gov">Checklist (NCP) Repository</a>
|
||
</p>
|
||
<p>
|
||
<a href="https://ncp.nist.gov/cce">Configurations (CCE)</a>
|
||
</p>
|
||
<p>
|
||
<a href="https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search">800-53 Controls</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a
|
||
href="https://csrc.nist.gov/projects/scap-validation-program">SCAP
|
||
Validated Tools</a>
|
||
</p>
|
||
<p>
|
||
<a
|
||
href="https://csrc.nist.gov/projects/security-content-automation-protocol">SCAP</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a
|
||
href="https://csrc.nist.gov/projects/united-states-government-configuration-baseline">USGCB</a>
|
||
</p>
|
||
</div>
|
||
</div>
|
||
</div></li>
|
||
|
||
<li><a href="/search"> Search <span
|
||
class="expander fa fa-plus" id="nvd-header-menu-search"
|
||
data-expander-name="search" data-expanded="false"> <span
|
||
class="element-invisible">Expand or Collapse</span>
|
||
</span>
|
||
</a>
|
||
<div style="display: none;" class="sub-menu"
|
||
data-expander-trigger="search">
|
||
<div class="row">
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/vuln/search">Vulnerability Search</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/products/cpe/search">CPE Search</a>
|
||
</p>
|
||
</div>
|
||
</div>
|
||
</div></li>
|
||
|
||
|
||
|
||
|
||
</ul>
|
||
</div>
|
||
<!-- /#mobile-nav-container -->
|
||
</div>
|
||
|
||
</nav>
|
||
<section id="itl-header" class="has-menu">
|
||
<div class="container">
|
||
<div class="row">
|
||
<div class="col-sm-12 col-md-8">
|
||
<h2 class="hidden-xs hidden-sm">
|
||
<a href="https://www.nist.gov/itl" target="_blank" rel="noopener noreferrer">Information Technology Laboratory</a>
|
||
</h2>
|
||
<h1 class="hidden-xs hidden-sm">
|
||
<a id="nvd-header-link"
|
||
href="/">National Vulnerability Database</a>
|
||
</h1>
|
||
<h1 class="hidden-xs text-center hidden-md hidden-lg"
|
||
>National Vulnerability Database</h1>
|
||
<h1 class="hidden-sm hidden-md hidden-lg text-center"
|
||
>NVD</h1>
|
||
|
||
</div>
|
||
<div class="col-sm-12 col-md-4">
|
||
<a style="width: 100%; text-align: center; display: block;padding-top: 14px">
|
||
<img id="img-logo-nvd-lg"
|
||
alt="National Vulnerability Database"
|
||
src="/site-media/images/F_NIST-Logo-NVD-white.svg"
|
||
width="500" height="100">
|
||
</a>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
</section>
|
||
|
||
|
||
</div>
|
||
</div>
|
||
</header>
|
||
<main>
|
||
<div>
|
||
<div id="body-section" class="container">
|
||
<div class="row">
|
||
<ol class="breadcrumb">
|
||
<li><a href="/vuln" class="CMSBreadCrumbsLink">Vulnerabilities</a></li>
|
||
</ol>
|
||
</div>
|
||
<div>
|
||
<style>
|
||
/* wrap the words for CVSS v4 */
|
||
#nistv4Metric {
|
||
word-wrap: break-word;
|
||
}
|
||
</style>
|
||
|
||
<script>
|
||
/*<![CDATA[*/
|
||
var vuln = {
|
||
nistV4Present: false,
|
||
cnaV4Present: false,
|
||
nistV3Present: true,
|
||
cnaV3Present: true,
|
||
nistV2Present: false,
|
||
cnaV2Present: false
|
||
};
|
||
/*]]>*/
|
||
</script>
|
||
|
||
|
||
<div>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
|
||
|
||
|
||
<div id="vulnDetailPanel">
|
||
<table id="vulnDetailTableView" style="border-collapse: collapse;">
|
||
<tr>
|
||
<td colspan="2">
|
||
|
||
<h2 data-testid="page-header">
|
||
<i class="fa fa-bug fa-flip-vertical"></i><span
|
||
data-testid="page-header-vuln-id">CVE-2022-38087</span>
|
||
Detail
|
||
</h2>
|
||
|
||
|
||
|
||
<div class="row">
|
||
<div class="col-lg-9 col-md-7 col-sm-12">
|
||
<div id="vulnShowWarningDiv"
|
||
data-testid="vuln-warning-container">
|
||
<div
|
||
role="alert" data-testid="vuln-warning-alert-container" class="bs-callout bs-callout-info">
|
||
<strong class="h4Size"><span
|
||
data-testid="vuln-warning-status-name">Modified</span></strong>
|
||
<hr/>
|
||
<p data-testid="vuln-warning-banner-content">This CVE record has been updated after NVD enrichment efforts were completed. Enrichment data supplied by the NVD may require amendment due to these changes.</p>
|
||
</div>
|
||
</div>
|
||
|
||
<h3 id="vulnDescriptionTitle"
|
||
data-testid="vuln-description-title">Description </h3>
|
||
|
||
<p data-testid="vuln-description">Exposure of resource to wrong sphere in BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable information disclosure via local access.</p><br/>
|
||
|
||
|
||
|
||
|
||
|
||
<!-- CVSS Severity and Vector Strings -->
|
||
<div id="vulnCvssPanel" data-testid="vuln-cvss-container"
|
||
class="row bs-callout bs-callout-success cvssVulnDetail">
|
||
<h3 style="display: inline" title="CVSS is not a measure of risk">Metrics</h3>
|
||
 
|
||
<div id="cvssVulnDetailBtn" class="btn-group">
|
||
<button id="btn-cvss4" type="button" title="Click here to view CVSS 4.0 data"
|
||
class="btn default btn-lg cvssBtn">CVSS Version 4.0
|
||
</button>
|
||
<button id="btn-cvss3" type="button" title="Click here to view CVSS 3.x data"
|
||
class="btn default btn-lg cvssBtn">CVSS Version 3.x
|
||
</button>
|
||
<button id="btn-cvss2" type="button" title="Click here to view CVSS 2.0 data"
|
||
class="btn default btn-lg cvssBtn">CVSS Version 2.0
|
||
</button>
|
||
</div>
|
||
|
||
|
||
<div id="cvssEnrichmentNotes">
|
||
<i>
|
||
<small>
|
||
NVD enrichment efforts reference publicly available information to associate
|
||
vector strings. CVSS information contributed by other sources is also
|
||
displayed.
|
||
</small>
|
||
</i>
|
||
</div>
|
||
|
||
<!-- CVSS v4.0 -->
|
||
<div class="container-fluid" id="Vuln4CvssPanel" data-testid="vuln-cvss4-panel">
|
||
<strong>CVSS 4.0 Severity and Vector Strings:</strong>
|
||
<!-- NIST -->
|
||
<div class="row no-gutters">
|
||
<br/>
|
||
<div class="col-lg-3 col-sm-6">
|
||
<div class="row">
|
||
<div class="col-lg-3 col-sm-6">
|
||
<img
|
||
src="/site-media/images/NVD_NVD_Stack_Plain.svg"
|
||
class="cvssNvdIcon" alt="NIST CVSS score">
|
||
</div>
|
||
<div class="col-lg-9 col-sm-6">
|
||
<strong>NIST:</strong> <span class="wrapData"
|
||
data-testid="vuln-cvss4-source-nvd">NVD</span>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
<div class="col-lg-3 col-sm-6">
|
||
<span><strong> </strong><span
|
||
class="severityDetail"> <a
|
||
id="Cvss4NistCalculatorAnchorNA"
|
||
class="label label-default"
|
||
data-testid="vuln-cvss4-panel-score-na">N/A</a></span></span>
|
||
</div>
|
||
<div class="col-lg-6 col-sm-12">
|
||
|
||
<span> <span
|
||
data-testid="vuln-cvss4-nist-vector-na">NVD assessment
|
||
not yet provided.</span></span> <input type="hidden"
|
||
id="nistV4MetricHidden"
|
||
value=""/>
|
||
</div>
|
||
</div>
|
||
<!-- CNA -->
|
||
|
||
|
||
<!-- ADP -->
|
||
|
||
|
||
|
||
|
||
</div>
|
||
|
||
|
||
<!-- CVSS V3.x -->
|
||
<div class="container-fluid" id="Vuln3CvssPanel" data-testid="vuln-cvss3-panel"
|
||
style="display: none;">
|
||
<strong>CVSS 3.x Severity and Vector Strings:</strong>
|
||
<!-- NIST -->
|
||
<div class="row no-gutters">
|
||
<br/>
|
||
|
||
<div class="col-lg-3 col-sm-6">
|
||
<div class="row">
|
||
<div class="col-lg-3 col-sm-6">
|
||
<img
|
||
src="/site-media/images/NVD_NVD_Stack_Plain.svg"
|
||
class="cvssNvdIcon" alt="NIST CVSS score">
|
||
|
||
|
||
</div>
|
||
<div class="col-lg-9 col-sm-6">
|
||
<strong>NIST:</strong> <span class="wrapData"
|
||
data-testid="vuln-cvss3-source-nvd">NVD</span>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
<div class="col-lg-3 col-sm-6">
|
||
<span><strong>Base
|
||
Score:</strong> <span class="severityDetail"> <a
|
||
id="Cvss3NistCalculatorAnchor"
|
||
href="/vuln-metrics/cvss/v3-calculator?name=CVE-2022-38087&vector=AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N&version=3.1&source=NIST"
|
||
data-testid="vuln-cvss3-panel-score"
|
||
class="label label-warning">5.5 MEDIUM</a>
|
||
</span></span>
|
||
|
||
</div>
|
||
<div class="col-lg-6 col-sm-12">
|
||
<span><strong>Vector:</strong>
|
||
<span data-testid="vuln-cvss3-nist-vector"
|
||
class="tooltipCvss3NistMetrics">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span></span>
|
||
<input type="hidden"
|
||
id="nistV3MetricHidden"
|
||
value="<span id = 'nistV3Metric' style = 'display:none' > <strong style ='font-size:1.2em' > CVSS v3.1 Severity and Metrics:</strong> <p data-testid='vuln-cvssv3-score-container'> <strong>Base Score: </strong> <span data-testid='vuln-cvssv3-base-score'>5.5 </span><span data-testid='vuln-cvssv3-base-score-severity'>MEDIUM</span> <br /> <strong>Vector: </strong> <span data-testid='vuln-cvssv3-vector'> AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N </span> <br /> <strong>Impact Score: </strong> <span data-testid='vuln-cvssv3-impact-score'> 3.6 </span> <br /> <strong>Exploitability Score: </strong> <span data-testid='vuln-cvssv3-exploitability-score'> 1.8 </span> </p> <hr /> <p data-testid='vuln-cvssv3-metrics-container'> <strong>Attack Vector (AV): </strong> <span data-testid='vuln-cvssv3-av'> Local </span> <br /> <strong>Attack Complexity (AC): </strong> <span data-testid='vuln-cvssv3-ac'> Low </span> <br /> <strong>Privileges Required (PR): </strong> <span data-testid='vuln-cvssv3-pr'> Low </span> <br /> <strong>User Interaction (UI): </strong> <span data-testid='vuln-cvssv3-ui'> None </span> <br /> <strong>Scope (S): </strong> <span data-testid='vuln-cvssv3-s'> Unchanged </span> <br /> <strong>Confidentiality (C): </strong> <span data-testid='vuln-cvssv3-c'> High </span> <br /> <strong>Integrity (I): </strong> <span data-testid='vuln-cvssv3-i'> None </span> <br /> <strong>Availability (A): </strong> <span data-testid='vuln-cvssv3-a'> None </span> </p> </span> "/>
|
||
|
||
</div>
|
||
|
||
|
||
</div>
|
||
<!-- CNA -->
|
||
<div class="row no-gutters">
|
||
|
||
<br/>
|
||
<div class="col-lg-3 col-sm-6">
|
||
<div class="row">
|
||
<div class="col-lg-3 col-sm-6">
|
||
|
||
<div id="v3CnaIconContributor">
|
||
<img src="/site-media/images/NVD_Contributor_Stack_Plain.svg"
|
||
class="cvssNvdIcon"
|
||
alt="Nist CVSS score does not match with CNA score">
|
||
|
||
</div>
|
||
|
||
|
||
</div>
|
||
<div class="col-lg-9 col-sm-6">
|
||
<strong>CNA:</strong> <span class="wrapData"
|
||
data-testid="vuln-cvss3-source-cna">Intel Corporation</span>
|
||
|
||
</div>
|
||
</div>
|
||
</div>
|
||
<div class="col-lg-3 col-sm-6">
|
||
<span><strong>Base
|
||
Score:</strong> <span class="severityDetail"> <a
|
||
id="Cvss3CnaCalculatorAnchor"
|
||
href="/vuln-metrics/cvss/v3-calculator?name=CVE-2022-38087&vector=AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N&version=3.1&source=Intel%20Corporation"
|
||
data-testid="vuln-cvss3-cna-panel-score"
|
||
class="label label-warning">4.1 MEDIUM</a></span></span>
|
||
</div>
|
||
<div class="col-lg-6 col-sm-12">
|
||
<span><strong>Vector:</strong> <span
|
||
data-testid="vuln-cvss3-cna-vector"
|
||
class="tooltipCvss3CnaMetrics">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N</span></span>
|
||
<input type="hidden" id="cnaV3MetricHidden"
|
||
value="<span id = 'nistV3Metric' style = 'display:none' > <strong style ='font-size:1.2em' > CVSS v3.1 Severity and Metrics:</strong> <p data-testid='vuln-cvssv3-score-container'> <strong>Base Score: </strong> <span data-testid='vuln-cvssv3-base-score'>4.1 </span><span data-testid='vuln-cvssv3-base-score-severity'>MEDIUM</span> <br /> <strong>Vector: </strong> <span data-testid='vuln-cvssv3-vector'> AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N </span> <br /> <strong>Impact Score: </strong> <span data-testid='vuln-cvssv3-impact-score'> 3.6 </span> <br /> <strong>Exploitability Score: </strong> <span data-testid='vuln-cvssv3-exploitability-score'> 0.5 </span> </p> <hr /> <p data-testid='vuln-cvssv3-metrics-container'> <strong>Attack Vector (AV): </strong> <span data-testid='vuln-cvssv3-av'> Local </span> <br /> <strong>Attack Complexity (AC): </strong> <span data-testid='vuln-cvssv3-ac'> High </span> <br /> <strong>Privileges Required (PR): </strong> <span data-testid='vuln-cvssv3-pr'> High </span> <br /> <strong>User Interaction (UI): </strong> <span data-testid='vuln-cvssv3-ui'> None </span> <br /> <strong>Scope (S): </strong> <span data-testid='vuln-cvssv3-s'> Unchanged </span> <br /> <strong>Confidentiality (C): </strong> <span data-testid='vuln-cvssv3-c'> High </span> <br /> <strong>Integrity (I): </strong> <span data-testid='vuln-cvssv3-i'> None </span> <br /> <strong>Availability (A): </strong> <span data-testid='vuln-cvssv3-a'> None </span> </p> </span> "/>
|
||
</div>
|
||
</div>
|
||
|
||
<!-- ADP -->
|
||
|
||
|
||
|
||
|
||
<!-- <div id="cvss3FootNote" class="cvssFootNote" >-->
|
||
<!-- <br/><br/>-->
|
||
<!-- <span id = "cvss3FootNoteSection" th:utext="${cvssData.cvss3FootNoteHtml}"></span>-->
|
||
<!-- </div>-->
|
||
</div>
|
||
|
||
<!-- CVSS V2.0 -->
|
||
<div class="container-fluid" id="Vuln2CvssPanel" data-testid="vuln-cvss2-panel"
|
||
style="display: none;">
|
||
<strong>CVSS 2.0 Severity and Vector Strings:</strong> <br/> <br/>
|
||
<!-- NIST -->
|
||
<div class="row no-gutters">
|
||
<div class="col-lg-3 col-sm-6">
|
||
<div class="row">
|
||
<div class="col-lg-3 col-sm-6">
|
||
<img
|
||
src="/site-media/images/NVD_NVD_Stack_Plain.svg"
|
||
class="cvssNvdIcon"
|
||
alt="National Institute of Standards and Technology">
|
||
</div>
|
||
<div class="col-lg-9 col-sm-6">
|
||
<strong>NIST:</strong> <span
|
||
data-testid="vuln-cvss2-source-nvd">NVD</span>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
<div class="col-lg-3 col-sm-6">
|
||
|
||
<span><strong>Base
|
||
Score:</strong> <span class="severityDetail"><a
|
||
id="Cvss2CalculatorAnchorNA" class="label label-default"
|
||
data-testid="vuln-cvss2-panel-score-na"
|
||
href=''>N/A</a></span></span>
|
||
|
||
</div>
|
||
<div class="col-lg-6 col-sm-12">
|
||
<span><span
|
||
data-testid="vuln-cvss2-panel-vector-na">NVD assessment
|
||
not yet provided.</span></span> <input type="hidden"
|
||
id="nistV2MetricHidden"
|
||
value=""/>
|
||
</div>
|
||
</div>
|
||
<!-- CNA -->
|
||
|
||
|
||
<!-- ADP -->
|
||
|
||
|
||
<!-- <div id = "cvss2FootNote" class="cvssFootNote" >-->
|
||
<!-- <br/><br/>-->
|
||
<!-- <span id = "cvss2FootNoteSection" th:utext="${cvssData.cvss2FootNoteHtml}"></span>-->
|
||
<!-- </div>-->
|
||
</div>
|
||
</div>
|
||
|
||
|
||
<div class="row col-sm-12">
|
||
|
||
|
||
|
||
<div id="vulnHyperlinksPanel">
|
||
<h3>References to Advisories, Solutions, and Tools</h3>
|
||
<p>
|
||
By selecting these links, you will be leaving NIST webspace.
|
||
We have provided these links to other web sites because they
|
||
may have information that would be of interest to you. No
|
||
inferences should be drawn on account of other sites being
|
||
referenced, or not, from this page. There may be other web
|
||
sites that are more appropriate for your purpose. NIST does
|
||
not necessarily endorse the views expressed, or concur with
|
||
the facts presented on these sites. Further, NIST does not
|
||
endorse any commercial products that may be mentioned on
|
||
these sites. Please address comments about this page to <a
|
||
href="mailto:nvd@nist.gov">nvd@nist.gov</a>.
|
||
</p>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-hyperlinks-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Hyperlink</th>
|
||
<th>Resource</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-0">
|
||
<td data-testid="vuln-hyperlinks-link-0">
|
||
<a
|
||
href="https://security.netapp.com/advisory/ntap-20231124-0006/"
|
||
target="_blank" rel="noopener noreferrer">https://security.netapp.com/advisory/ntap-20231124-0006/</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-0">
|
||
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-1">
|
||
<td data-testid="vuln-hyperlinks-link-1">
|
||
<a
|
||
href="https://security.netapp.com/advisory/ntap-20231124-0006/"
|
||
target="_blank" rel="noopener noreferrer">https://security.netapp.com/advisory/ntap-20231124-0006/</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-1">
|
||
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-2">
|
||
<td data-testid="vuln-hyperlinks-link-2">
|
||
<a
|
||
href="https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00807.html"
|
||
target="_blank" rel="noopener noreferrer">https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00807.html</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-2">
|
||
<span>
|
||
<span class="badge">Vendor Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-3">
|
||
<td data-testid="vuln-hyperlinks-link-3">
|
||
<a
|
||
href="https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00807.html"
|
||
target="_blank" rel="noopener noreferrer">https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00807.html</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-3">
|
||
<span>
|
||
<span class="badge">Vendor Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
</div>
|
||
|
||
|
||
|
||
<div id="vulnTechnicalDetailsDiv" class="technicalDetails"
|
||
data-testid="vuln-technical-details-container">
|
||
<h3>Weakness Enumeration</h3>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-CWEs-table">
|
||
<thead>
|
||
<tr>
|
||
<th>CWE-ID</th>
|
||
<th>CWE Name</th>
|
||
<th>Source</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
|
||
<tr data-testid="vuln-CWEs-row-0">
|
||
<td data-testid="vuln-CWEs-link-0">
|
||
<a href="http://cwe.mitre.org/data/definitions/668.html" target="_blank" rel="noopener noreferrer">CWE-668</a>
|
||
|
||
</td>
|
||
<td
|
||
data-testid="vuln-CWEs-link-0">Exposure of Resource to Wrong Sphere</td>
|
||
|
||
<td data-testid="vuln-cwes-assigner-0">
|
||
<span class="cweSource" data-testid="vuln-cwes-assigner-0-0"
|
||
>
|
||
<img src="/site-media/images/NVD_NVD_Stack_Plain.svg"
|
||
class="cweNvdIcon"
|
||
alt="cwe source acceptance level">
|
||
|
||
<span>NIST </span>
|
||
</span><span class="cweSource" data-testid="vuln-cwes-assigner-0-1"
|
||
>
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
<span>Intel Corporation </span>
|
||
</span>
|
||
|
||
</td>
|
||
|
||
</tr>
|
||
|
||
</tbody>
|
||
</table>
|
||
|
||
</div>
|
||
|
||
|
||
<div>
|
||
<h3>
|
||
Known Affected Software Configurations <small> <a
|
||
id="toggleCpeVersion" href="#vulnConfigurationsArea">Switch
|
||
to CPE 2.2</a></small>
|
||
</h3>
|
||
<span id="vulnConfigurationsArea"></span>
|
||
<input type="hidden" id="cveIdHidden" value="CVE-2022-38087"/>
|
||
|
||
<div>
|
||
|
||
<div id="vulnCpeTreeLoading"><h3>CPEs loading, please wait.</h3></div>
|
||
<div id="vulnCpeTree" style="display: none;"></div>
|
||
<input type="hidden"
|
||
id="InputRestBasePath"
|
||
value="/rest/public">
|
||
<input type="hidden" id="cveTreeJsonDataHidden" value="[{"id":1,"dataTestId":"vuln-software-config-1","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-1-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-1-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e-2314_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e-2314_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e-2314_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-0-0","id":"15655812","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-1-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e-2314%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e-2314:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e-2314:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-1-0","id":"15655939","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":2,"dataTestId":"vuln-software-config-2","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-2-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-2-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e-2324g_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e-2324g_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e-2324g_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-0-0","id":"15655940","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-2-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e-2324g%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e-2324g:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e-2324g:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1-0","id":"15655813","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":3,"dataTestId":"vuln-software-config-3","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-3-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-3-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e-2334_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e-2334_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e-2334_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-0-0","id":"15655814","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-3-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e-2334%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e-2334:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e-2334:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1-0","id":"15655941","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":4,"dataTestId":"vuln-software-config-4","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-4-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-4-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e-2336_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e-2336_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e-2336_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-0-0","id":"15655942","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-4-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e-2336%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e-2336:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e-2336:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-1-0","id":"15655815","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":5,"dataTestId":"vuln-software-config-5","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-5-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-5-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e-2356g_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e-2356g_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e-2356g_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-0-0","id":"15655816","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-5-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e-2356g%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e-2356g:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e-2356g:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-1-0","id":"15655943","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":6,"dataTestId":"vuln-software-config-6","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-6-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-6-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e-2374g_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e-2374g_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e-2374g_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-6-0-0-0","id":"15655944","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-6-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e-2374g%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e-2374g:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e-2374g:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-6-0-1-0","id":"15655817","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":7,"dataTestId":"vuln-software-config-7","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-7-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-7-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e-2378_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e-2378_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e-2378_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-7-0-0-0","id":"15655818","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-7-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e-2378%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e-2378:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e-2378:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-7-0-1-0","id":"15655945","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":8,"dataTestId":"vuln-software-config-8","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-8-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-8-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e-2378g_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e-2378g_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e-2378g_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-8-0-0-0","id":"15655946","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-8-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e-2378g%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e-2378g:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e-2378g:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-8-0-1-0","id":"15655819","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":9,"dataTestId":"vuln-software-config-9","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-9-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-9-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e-2386g_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e-2386g_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e-2386g_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-0-0","id":"15655820","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-9-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e-2386g%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e-2386g:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e-2386g:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-9-0-1-0","id":"15655947","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":10,"dataTestId":"vuln-software-config-10","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-10-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-10-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e-2388g_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e-2388g_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e-2388g_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-0-0","id":"15655948","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-10-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e-2388g%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e-2388g:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e-2388g:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-10-0-1-0","id":"15655821","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":11,"dataTestId":"vuln-software-config-11","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-11-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-11-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e-2226ge_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e-2226ge_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e-2226ge_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-0-0","id":"15655822","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-11-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e-2226ge%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e-2226ge:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e-2226ge:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-11-0-1-0","id":"15655949","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":12,"dataTestId":"vuln-software-config-12","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-12-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-12-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e-2254me_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e-2254me_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e-2254me_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-12-0-0-0","id":"15655950","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-12-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e-2254me%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e-2254me:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e-2254me:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-12-0-1-0","id":"15655823","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":13,"dataTestId":"vuln-software-config-13","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-13-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-13-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e-2254ml_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e-2254ml_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e-2254ml_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-13-0-0-0","id":"15655824","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-13-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e-2254ml%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e-2254ml:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e-2254ml:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-13-0-1-0","id":"15655951","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":14,"dataTestId":"vuln-software-config-14","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-14-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-14-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e-2276me_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e-2276me_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e-2276me_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-14-0-0-0","id":"15655952","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-14-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e-2276me%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e-2276me:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e-2276me:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-14-0-1-0","id":"15655825","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":15,"dataTestId":"vuln-software-config-15","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-15-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-15-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e-2276ml_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e-2276ml_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e-2276ml_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-15-0-0-0","id":"15655826","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-15-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e-2276ml%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e-2276ml:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e-2276ml:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-15-0-1-0","id":"15655953","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":16,"dataTestId":"vuln-software-config-16","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-16-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-16-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e-2278ge_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e-2278ge_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e-2278ge_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-16-0-0-0","id":"15655954","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-16-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e-2278ge%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e-2278ge:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e-2278ge:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-16-0-1-0","id":"15655827","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":17,"dataTestId":"vuln-software-config-17","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-17-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-17-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e-2278gel_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e-2278gel_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e-2278gel_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-17-0-0-0","id":"15655828","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-17-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e-2278gel%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e-2278gel:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e-2278gel:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-17-0-1-0","id":"15655955","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":18,"dataTestId":"vuln-software-config-18","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-18-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-18-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e-2224_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e-2224_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e-2224_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-18-0-0-0","id":"15655956","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-18-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e-2224%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e-2224:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e-2224:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-18-0-1-0","id":"15655829","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":19,"dataTestId":"vuln-software-config-19","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-19-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-19-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e-2224g_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e-2224g_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e-2224g_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-19-0-0-0","id":"15655830","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-19-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e-2224g%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e-2224g:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e-2224g:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-19-0-1-0","id":"15655957","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":20,"dataTestId":"vuln-software-config-20","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-20-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-20-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e-2226g_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e-2226g_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e-2226g_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-20-0-0-0","id":"15655958","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-20-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e-2226g%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e-2226g:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e-2226g:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-20-0-1-0","id":"15655831","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":21,"dataTestId":"vuln-software-config-21","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-21-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-21-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e-2234_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e-2234_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e-2234_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-21-0-0-0","id":"15655832","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-21-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e-2234%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e-2234:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e-2234:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-21-0-1-0","id":"15655959","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":22,"dataTestId":"vuln-software-config-22","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-22-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-22-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e-2236_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e-2236_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e-2236_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-22-0-0-0","id":"15655960","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-22-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e-2236%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e-2236:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e-2236:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-22-0-1-0","id":"15655833","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":23,"dataTestId":"vuln-software-config-23","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-23-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-23-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e-2244g_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e-2244g_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e-2244g_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-23-0-0-0","id":"15655834","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-23-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e-2244g%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e-2244g:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e-2244g:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-23-0-1-0","id":"15655961","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":24,"dataTestId":"vuln-software-config-24","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-24-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-24-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e-2246g_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e-2246g_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e-2246g_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-24-0-0-0","id":"15655962","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-24-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e-2246g%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e-2246g:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e-2246g:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-24-0-1-0","id":"15655891","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":25,"dataTestId":"vuln-software-config-25","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-25-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-25-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e-2274g_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e-2274g_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e-2274g_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-25-0-0-0","id":"15655890","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-25-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e-2274g%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e-2274g:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e-2274g:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-25-0-1-0","id":"15655963","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":26,"dataTestId":"vuln-software-config-26","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-26-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-26-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e-2276g_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e-2276g_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e-2276g_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-26-0-0-0","id":"15655964","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-26-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e-2276g%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e-2276g:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e-2276g:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-26-0-1-0","id":"15655889","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":27,"dataTestId":"vuln-software-config-27","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-27-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-27-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e-2276m_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e-2276m_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e-2276m_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-27-0-0-0","id":"15655888","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-27-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e-2276m%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e-2276m:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e-2276m:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-27-0-1-0","id":"15655965","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":28,"dataTestId":"vuln-software-config-28","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-28-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-28-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e-2278g_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e-2278g_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e-2278g_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-28-0-0-0","id":"15655966","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-28-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e-2278g%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e-2278g:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e-2278g:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-28-0-1-0","id":"15655887","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":29,"dataTestId":"vuln-software-config-29","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-29-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-29-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e-2286g_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e-2286g_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e-2286g_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-29-0-0-0","id":"15655967","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-29-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e-2286g%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e-2286g:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e-2286g:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-29-0-1-0","id":"15655968","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":30,"dataTestId":"vuln-software-config-30","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-30-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-30-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e-2286m_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e-2286m_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e-2286m_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-30-0-0-0","id":"15655886","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-30-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e-2286m%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e-2286m:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e-2286m:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-30-0-1-0","id":"15655969","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":31,"dataTestId":"vuln-software-config-31","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-31-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-31-0-0","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e-2288g%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e-2288g:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e-2288g:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-31-0-0-0","id":"15655885","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-31-0-1","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e-2288g_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e-2288g_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e-2288g_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-31-0-1-0","id":"15655970","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":32,"dataTestId":"vuln-software-config-32","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-32-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-32-0-0","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e-2124%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e-2124:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e-2124:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-32-0-0-0","id":"15655884","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-32-0-1","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e-2124_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e-2124_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e-2124_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-32-0-1-0","id":"15655971","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":33,"dataTestId":"vuln-software-config-33","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-33-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-33-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e-2124g_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e-2124g_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e-2124g_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-33-0-0-0","id":"15655883","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-33-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e-2124g%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e-2124g:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e-2124g:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-33-0-1-0","id":"15655972","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":34,"dataTestId":"vuln-software-config-34","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-34-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-34-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e-2126g_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e-2126g_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e-2126g_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-34-0-0-0","id":"15655882","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-34-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e-2126g%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e-2126g:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e-2126g:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-34-0-1-0","id":"15655973","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":35,"dataTestId":"vuln-software-config-35","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-35-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-35-0-0","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e-2134%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e-2134:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e-2134:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-35-0-0-0","id":"15655881","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-35-0-1","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e-2134_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e-2134_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e-2134_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-35-0-1-0","id":"15655974","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":36,"dataTestId":"vuln-software-config-36","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-36-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-36-0-0","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e-2136%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e-2136:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e-2136:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-36-0-0-0","id":"15655880","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-36-0-1","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e-2136_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e-2136_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e-2136_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-36-0-1-0","id":"15655975","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":37,"dataTestId":"vuln-software-config-37","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-37-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-37-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e-2144g_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e-2144g_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e-2144g_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-37-0-0-0","id":"15655879","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-37-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e-2144g%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e-2144g:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e-2144g:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-37-0-1-0","id":"15655976","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":38,"dataTestId":"vuln-software-config-38","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-38-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-38-0-0","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e-2146g%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e-2146g:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e-2146g:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-38-0-0-0","id":"15655878","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-38-0-1","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e-2146g_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e-2146g_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e-2146g_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-38-0-1-0","id":"15655977","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":39,"dataTestId":"vuln-software-config-39","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-39-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-39-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e-2174g_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e-2174g_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e-2174g_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-39-0-0-0","id":"15655978","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-39-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e-2174g%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e-2174g:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e-2174g:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-39-0-1-0","id":"15655877","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":40,"dataTestId":"vuln-software-config-40","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-40-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-40-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e-2176g_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e-2176g_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e-2176g_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-40-0-0-0","id":"15655979","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-40-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e-2176g%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e-2176g:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e-2176g:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-40-0-1-0","id":"15655876","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":41,"dataTestId":"vuln-software-config-41","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-41-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-41-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e-2186g_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e-2186g_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e-2186g_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-41-0-0-0","id":"15655980","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-41-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e-2186g%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e-2186g:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e-2186g:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-41-0-1-0","id":"15655875","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":42,"dataTestId":"vuln-software-config-42","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-42-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-42-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e-2176m_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e-2176m_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e-2176m_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-42-0-0-0","id":"15655981","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-42-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e-2176m%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e-2176m:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e-2176m:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-42-0-1-0","id":"15655874","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":43,"dataTestId":"vuln-software-config-43","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-43-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-43-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_e-2186m_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_e-2186m_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_e-2186m_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-43-0-0-0","id":"15655873","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-43-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_e-2186m%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_e-2186m:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_e-2186m:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-43-0-1-0","id":"15655982","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":44,"dataTestId":"vuln-software-config-44","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-44-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-44-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i9-10850k_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i9-10850k_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i9-10850k_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-44-0-0-0","id":"15655872","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-44-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i9-10850k%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i9-10850k:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i9-10850k:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-44-0-1-0","id":"15655983","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":45,"dataTestId":"vuln-software-config-45","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-45-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-45-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i9-10885h_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i9-10885h_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i9-10885h_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-45-0-0-0","id":"15655871","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-45-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i9-10885h%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i9-10885h:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i9-10885h:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-45-0-1-0","id":"15655984","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":46,"dataTestId":"vuln-software-config-46","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-46-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-46-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i9-10900_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i9-10900_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i9-10900_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-46-0-0-0","id":"15655870","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-46-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i9-10900%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i9-10900:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i9-10900:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-46-0-1-0","id":"15655985","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":47,"dataTestId":"vuln-software-config-47","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-47-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-47-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i9-10900e_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i9-10900e_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i9-10900e_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-47-0-0-0","id":"15655869","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-47-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i9-10900e%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i9-10900e:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i9-10900e:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-47-0-1-0","id":"15655986","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":48,"dataTestId":"vuln-software-config-48","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-48-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-48-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i9-10900f_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i9-10900f_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i9-10900f_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-48-0-0-0","id":"15655868","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-48-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i9-10900f%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i9-10900f:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i9-10900f:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-48-0-1-0","id":"15655987","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":49,"dataTestId":"vuln-software-config-49","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-49-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-49-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i9-10900k_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i9-10900k_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i9-10900k_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-49-0-0-0","id":"15655835","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-49-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i9-10900k%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i9-10900k:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i9-10900k:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-49-0-1-0","id":"15655988","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":50,"dataTestId":"vuln-software-config-50","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-50-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-50-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i9-10900kf_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i9-10900kf_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i9-10900kf_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-50-0-0-0","id":"15655836","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-50-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i9-10900kf%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i9-10900kf:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i9-10900kf:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-50-0-1-0","id":"15655989","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":51,"dataTestId":"vuln-software-config-51","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-51-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-51-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i9-10900t_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i9-10900t_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i9-10900t_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-51-0-0-0","id":"15655837","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-51-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i9-10900t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i9-10900t:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i9-10900t:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-51-0-1-0","id":"15655990","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":52,"dataTestId":"vuln-software-config-52","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-52-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-52-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i9-10900te_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i9-10900te_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i9-10900te_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-52-0-0-0","id":"15655838","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-52-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i9-10900te%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i9-10900te:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i9-10900te:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-52-0-1-0","id":"15655839","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":53,"dataTestId":"vuln-software-config-53","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-53-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-53-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i9-10980hk_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i9-10980hk_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i9-10980hk_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-53-0-0-0","id":"15655991","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-53-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i9-10980hk%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i9-10980hk:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i9-10980hk:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-53-0-1-0","id":"15655840","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":54,"dataTestId":"vuln-software-config-54","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-54-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-54-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i7-10870h_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i7-10870h_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i7-10870h_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-54-0-0-0","id":"15655992","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-54-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i7-10870h%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i7-10870h:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i7-10870h:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-54-0-1-0","id":"15655841","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":55,"dataTestId":"vuln-software-config-55","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-55-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-55-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i7-10610u_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i7-10610u_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i7-10610u_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-55-0-0-0","id":"15655993","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-55-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i7-10610u%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i7-10610u:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i7-10610u:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-55-0-1-0","id":"15655842","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":56,"dataTestId":"vuln-software-config-56","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-56-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-56-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i7-10810u_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i7-10810u_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i7-10810u_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-56-0-0-0","id":"15655994","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-56-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i7-10810u%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i7-10810u:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i7-10810u:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-56-0-1-0","id":"15655843","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":57,"dataTestId":"vuln-software-config-57","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-57-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-57-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i7-1068ng7_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i7-1068ng7_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i7-1068ng7_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-57-0-0-0","id":"15655995","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-57-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i7-1068ng7%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i7-1068ng7:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i7-1068ng7:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-57-0-1-0","id":"15655844","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":58,"dataTestId":"vuln-software-config-58","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-58-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-58-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i7-10700_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i7-10700_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i7-10700_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-58-0-0-0","id":"15655996","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-58-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i7-10700%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i7-10700:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i7-10700:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-58-0-1-0","id":"15655845","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":59,"dataTestId":"vuln-software-config-59","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-59-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-59-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i7-10700e_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i7-10700e_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i7-10700e_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-59-0-0-0","id":"15655997","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-59-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i7-10700e%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i7-10700e:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i7-10700e:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-59-0-1-0","id":"15655846","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":60,"dataTestId":"vuln-software-config-60","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-60-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-60-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i7-10700f_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i7-10700f_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i7-10700f_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-60-0-0-0","id":"15655998","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-60-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i7-10700f%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i7-10700f:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i7-10700f:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-60-0-1-0","id":"15655847","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":61,"dataTestId":"vuln-software-config-61","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-61-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-61-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i7-10700k_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i7-10700k_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i7-10700k_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-61-0-0-0","id":"15655999","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-61-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i7-10700k%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i7-10700k:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i7-10700k:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-61-0-1-0","id":"15655848","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":62,"dataTestId":"vuln-software-config-62","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-62-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-62-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i7-10700kf_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i7-10700kf_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i7-10700kf_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-62-0-0-0","id":"15656000","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-62-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i7-10700kf%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i7-10700kf:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i7-10700kf:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-62-0-1-0","id":"15655849","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":63,"dataTestId":"vuln-software-config-63","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-63-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-63-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i7-10700t_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i7-10700t_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i7-10700t_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-63-0-0-0","id":"15656001","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-63-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i7-10700t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i7-10700t:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i7-10700t:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-63-0-1-0","id":"15655850","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":64,"dataTestId":"vuln-software-config-64","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-64-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-64-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i7-10700te_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i7-10700te_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i7-10700te_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-64-0-0-0","id":"15656002","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-64-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i7-10700te%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i7-10700te:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i7-10700te:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-64-0-1-0","id":"15655851","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":65,"dataTestId":"vuln-software-config-65","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-65-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-65-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i7-10750h_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i7-10750h_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i7-10750h_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-65-0-0-0","id":"15656003","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-65-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i7-10750h%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i7-10750h:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i7-10750h:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-65-0-1-0","id":"15655852","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":66,"dataTestId":"vuln-software-config-66","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-66-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-66-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i7-10850h_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i7-10850h_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i7-10850h_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-66-0-0-0","id":"15656004","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-66-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i7-10850h%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i7-10850h:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i7-10850h:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-66-0-1-0","id":"15655853","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":67,"dataTestId":"vuln-software-config-67","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-67-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-67-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i7-10875h_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i7-10875h_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i7-10875h_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-67-0-0-0","id":"15655854","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-67-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i7-10875h%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i7-10875h:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i7-10875h:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-67-0-1-0","id":"15656005","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":68,"dataTestId":"vuln-software-config-68","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-68-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-68-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i7-10510u_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i7-10510u_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i7-10510u_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-68-0-0-0","id":"15655855","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-68-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i7-10510u%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i7-10510u:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i7-10510u:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-68-0-1-0","id":"15656006","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":69,"dataTestId":"vuln-software-config-69","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-69-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-69-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i7-10510y_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i7-10510y_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i7-10510y_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-69-0-0-0","id":"15655856","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-69-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i7-10510y%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i7-10510y:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i7-10510y:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-69-0-1-0","id":"15656007","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":70,"dataTestId":"vuln-software-config-70","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-70-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-70-0-0","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i7-10710u%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i7-10710u:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i7-10710u:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-70-0-0-0","id":"15656008","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-70-0-1","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i7-10710u_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i7-10710u_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i7-10710u_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-70-0-1-0","id":"15655857","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":71,"dataTestId":"vuln-software-config-71","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-71-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-71-0-0","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i7-1060g7%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i7-1060g7:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i7-1060g7:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-71-0-0-0","id":"15656009","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-71-0-1","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i7-1060g7_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i7-1060g7_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i7-1060g7_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-71-0-1-0","id":"15655858","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":72,"dataTestId":"vuln-software-config-72","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-72-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-72-0-0","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i7-1065g7%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i7-1065g7:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i7-1065g7:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-72-0-0-0","id":"15656010","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-72-0-1","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i7-1065g7_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i7-1065g7_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i7-1065g7_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-72-0-1-0","id":"15655859","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":73,"dataTestId":"vuln-software-config-73","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-73-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-73-0-0","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i5-10505%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i5-10505:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i5-10505:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-73-0-0-0","id":"15656011","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-73-0-1","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i5-10505_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i5-10505_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i5-10505_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-73-0-1-0","id":"15655860","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":74,"dataTestId":"vuln-software-config-74","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-74-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-74-0-0","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i5-10500h%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i5-10500h:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i5-10500h:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-74-0-0-0","id":"15656012","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-74-0-1","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i5-10500h_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i5-10500h_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i5-10500h_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-74-0-1-0","id":"15655861","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":75,"dataTestId":"vuln-software-config-75","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-75-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-75-0-0","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i5-10200h%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i5-10200h:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i5-10200h:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-75-0-0-0","id":"15656013","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-75-0-1","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i5-10200h_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i5-10200h_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i5-10200h_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-75-0-1-0","id":"15655862","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":76,"dataTestId":"vuln-software-config-76","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-76-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-76-0-0","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i5-10310u%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i5-10310u:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i5-10310u:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-76-0-0-0","id":"15656014","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-76-0-1","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i5-10310u_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i5-10310u_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i5-10310u_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-76-0-1-0","id":"15655863","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":77,"dataTestId":"vuln-software-config-77","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-77-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-77-0-0","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i5-1038ng7%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i5-1038ng7:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i5-1038ng7:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-77-0-0-0","id":"15656015","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-77-0-1","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i5-1038ng7_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i5-1038ng7_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i5-1038ng7_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-77-0-1-0","id":"15655864","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":78,"dataTestId":"vuln-software-config-78","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-78-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-78-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i5-10400_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i5-10400_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i5-10400_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-78-0-0-0","id":"15655865","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-78-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i5-10400%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i5-10400:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i5-10400:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-78-0-1-0","id":"15656016","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":79,"dataTestId":"vuln-software-config-79","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-79-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-79-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i5-10400f_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i5-10400f_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i5-10400f_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-79-0-0-0","id":"15655866","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-79-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i5-10400f%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i5-10400f:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i5-10400f:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-79-0-1-0","id":"15656017","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":80,"dataTestId":"vuln-software-config-80","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-80-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-80-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i5-10400t_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i5-10400t_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i5-10400t_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-80-0-0-0","id":"15655867","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-80-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i5-10400t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i5-10400t:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i5-10400t:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-80-0-1-0","id":"15656018","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":81,"dataTestId":"vuln-software-config-81","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-81-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-81-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i5-10500_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i5-10500_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i5-10500_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-81-0-0-0","id":"15655892","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-81-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i5-10500%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i5-10500:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i5-10500:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-81-0-1-0","id":"15656019","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":82,"dataTestId":"vuln-software-config-82","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-82-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-82-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i5-10500e_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i5-10500e_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i5-10500e_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-82-0-0-0","id":"15655893","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-82-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i5-10500e%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i5-10500e:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i5-10500e:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-82-0-1-0","id":"15656020","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":83,"dataTestId":"vuln-software-config-83","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-83-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-83-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i5-10500t_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i5-10500t_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i5-10500t_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-83-0-0-0","id":"15655894","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-83-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i5-10500t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i5-10500t:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i5-10500t:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-83-0-1-0","id":"15656021","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":84,"dataTestId":"vuln-software-config-84","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-84-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-84-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i5-10500te_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i5-10500te_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i5-10500te_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-84-0-0-0","id":"15655895","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-84-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i5-10500te%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i5-10500te:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i5-10500te:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-84-0-1-0","id":"15656022","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":85,"dataTestId":"vuln-software-config-85","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-85-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-85-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i5-10600_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i5-10600_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i5-10600_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-85-0-0-0","id":"15655896","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-85-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i5-10600%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i5-10600:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i5-10600:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-85-0-1-0","id":"15656023","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":86,"dataTestId":"vuln-software-config-86","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-86-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-86-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i5-10600k_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i5-10600k_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i5-10600k_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-86-0-0-0","id":"15655897","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-86-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i5-10600k%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i5-10600k:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i5-10600k:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-86-0-1-0","id":"15656024","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":87,"dataTestId":"vuln-software-config-87","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-87-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-87-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i5-10600kf_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i5-10600kf_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i5-10600kf_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-87-0-0-0","id":"15655898","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-87-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i5-10600kf%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i5-10600kf:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i5-10600kf:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-87-0-1-0","id":"15656025","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":88,"dataTestId":"vuln-software-config-88","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-88-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-88-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i5-10600t_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i5-10600t_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i5-10600t_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-88-0-0-0","id":"15655899","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-88-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i5-10600t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i5-10600t:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i5-10600t:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-88-0-1-0","id":"15656026","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":89,"dataTestId":"vuln-software-config-89","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-89-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-89-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i5-10300h_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i5-10300h_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i5-10300h_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-89-0-0-0","id":"15655900","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-89-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i5-10300h%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i5-10300h:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i5-10300h:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-89-0-1-0","id":"15656027","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":90,"dataTestId":"vuln-software-config-90","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-90-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-90-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i5-10400h_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i5-10400h_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i5-10400h_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-90-0-0-0","id":"15655901","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-90-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i5-10400h%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i5-10400h:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i5-10400h:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-90-0-1-0","id":"15656028","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":91,"dataTestId":"vuln-software-config-91","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-91-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-91-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i5-10210u_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i5-10210u_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i5-10210u_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-91-0-0-0","id":"15655902","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-91-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i5-10210u%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i5-10210u:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i5-10210u:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-91-0-1-0","id":"15656029","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":92,"dataTestId":"vuln-software-config-92","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-92-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-92-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i5-10210y_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i5-10210y_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i5-10210y_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-92-0-0-0","id":"15655903","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-92-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i5-10210y%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i5-10210y:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i5-10210y:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-92-0-1-0","id":"15656030","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":93,"dataTestId":"vuln-software-config-93","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-93-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-93-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i5-10310y_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i5-10310y_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i5-10310y_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-93-0-0-0","id":"15655904","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-93-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i5-10310y%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i5-10310y:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i5-10310y:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-93-0-1-0","id":"15656031","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":94,"dataTestId":"vuln-software-config-94","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-94-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-94-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i5-1030g4_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i5-1030g4_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i5-1030g4_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-94-0-0-0","id":"15655905","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-94-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i5-1030g4%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i5-1030g4:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i5-1030g4:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-94-0-1-0","id":"15656032","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":95,"dataTestId":"vuln-software-config-95","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-95-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-95-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i5-1030g7_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i5-1030g7_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i5-1030g7_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-95-0-0-0","id":"15655906","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-95-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i5-1030g7%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i5-1030g7:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i5-1030g7:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-95-0-1-0","id":"15656033","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":96,"dataTestId":"vuln-software-config-96","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-96-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-96-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i5-1035g1_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i5-1035g1_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i5-1035g1_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-96-0-0-0","id":"15655907","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-96-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i5-1035g1%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i5-1035g1:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i5-1035g1:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-96-0-1-0","id":"15656034","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":97,"dataTestId":"vuln-software-config-97","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-97-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-97-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i5-1035g4_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i5-1035g4_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i5-1035g4_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-97-0-0-0","id":"15655908","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-97-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i5-1035g4%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i5-1035g4:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i5-1035g4:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-97-0-1-0","id":"15656035","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":98,"dataTestId":"vuln-software-config-98","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-98-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-98-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i5-1035g7_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i5-1035g7_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i5-1035g7_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-98-0-0-0","id":"15655909","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-98-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i5-1035g7%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i5-1035g7:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i5-1035g7:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-98-0-1-0","id":"15656036","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":99,"dataTestId":"vuln-software-config-99","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-99-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-99-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i3-10105_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i3-10105_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i3-10105_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-99-0-0-0","id":"15655910","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-99-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i3-10105%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i3-10105:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i3-10105:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-99-0-1-0","id":"15656037","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":100,"dataTestId":"vuln-software-config-100","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-100-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-100-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i3-10105f_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i3-10105f_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i3-10105f_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-100-0-0-0","id":"15656038","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-100-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i3-10105f%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i3-10105f:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i3-10105f:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-100-0-1-0","id":"15655911","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":101,"dataTestId":"vuln-software-config-101","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-101-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-101-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i3-10105t_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i3-10105t_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i3-10105t_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-101-0-0-0","id":"15656039","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-101-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i3-10105t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i3-10105t:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i3-10105t:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-101-0-1-0","id":"15655912","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":102,"dataTestId":"vuln-software-config-102","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-102-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-102-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i3-10305_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i3-10305_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i3-10305_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-102-0-0-0","id":"15656040","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-102-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i3-10305%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i3-10305:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i3-10305:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-102-0-1-0","id":"15655913","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":103,"dataTestId":"vuln-software-config-103","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-103-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-103-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i3-10305t_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i3-10305t_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i3-10305t_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-103-0-0-0","id":"15656041","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-103-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i3-10305t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i3-10305t:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i3-10305t:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-103-0-1-0","id":"15655914","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":104,"dataTestId":"vuln-software-config-104","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-104-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-104-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i3-10325_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i3-10325_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i3-10325_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-104-0-0-0","id":"15656042","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-104-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i3-10325%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i3-10325:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i3-10325:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-104-0-1-0","id":"15655915","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":105,"dataTestId":"vuln-software-config-105","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-105-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-105-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i3-10100y_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i3-10100y_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i3-10100y_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-105-0-0-0","id":"15656043","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-105-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i3-10100y%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i3-10100y:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i3-10100y:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-105-0-1-0","id":"15655916","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":106,"dataTestId":"vuln-software-config-106","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-106-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-106-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i3-10100f_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i3-10100f_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i3-10100f_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-106-0-0-0","id":"15656044","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-106-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i3-10100f%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i3-10100f:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i3-10100f:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-106-0-1-0","id":"15655917","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":107,"dataTestId":"vuln-software-config-107","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-107-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-107-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i3-10100_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i3-10100_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i3-10100_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-107-0-0-0","id":"15656045","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-107-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i3-10100%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i3-10100:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i3-10100:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-107-0-1-0","id":"15655918","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":108,"dataTestId":"vuln-software-config-108","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-108-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-108-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i3-10100e_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i3-10100e_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i3-10100e_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-108-0-0-0","id":"15656046","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-108-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i3-10100e%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i3-10100e:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i3-10100e:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-108-0-1-0","id":"15655919","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":109,"dataTestId":"vuln-software-config-109","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-109-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-109-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i3-10100t_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i3-10100t_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i3-10100t_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-109-0-0-0","id":"15656047","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-109-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i3-10100t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i3-10100t:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i3-10100t:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-109-0-1-0","id":"15655920","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":110,"dataTestId":"vuln-software-config-110","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-110-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-110-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i3-10100te_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i3-10100te_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i3-10100te_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-110-0-0-0","id":"15656048","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-110-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i3-10100te%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i3-10100te:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i3-10100te:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-110-0-1-0","id":"15655921","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":111,"dataTestId":"vuln-software-config-111","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-111-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-111-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i3-10300_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i3-10300_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i3-10300_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-111-0-0-0","id":"15656049","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-111-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i3-10300%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i3-10300:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i3-10300:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-111-0-1-0","id":"15655922","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":112,"dataTestId":"vuln-software-config-112","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-112-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-112-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i3-10300t_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i3-10300t_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i3-10300t_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-112-0-0-0","id":"15656050","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-112-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i3-10300t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i3-10300t:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i3-10300t:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-112-0-1-0","id":"15655923","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":113,"dataTestId":"vuln-software-config-113","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-113-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-113-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i3-10320_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i3-10320_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i3-10320_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-113-0-0-0","id":"15656051","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-113-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i3-10320%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i3-10320:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i3-10320:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-113-0-1-0","id":"15655924","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":114,"dataTestId":"vuln-software-config-114","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-114-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-114-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i3-10110u_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i3-10110u_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i3-10110u_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-114-0-0-0","id":"15656052","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-114-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i3-10110u%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i3-10110u:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i3-10110u:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-114-0-1-0","id":"15655925","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":115,"dataTestId":"vuln-software-config-115","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-115-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-115-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i3-10110y_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i3-10110y_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i3-10110y_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-115-0-0-0","id":"15656053","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-115-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i3-10110y%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i3-10110y:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i3-10110y:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-115-0-1-0","id":"15655926","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":116,"dataTestId":"vuln-software-config-116","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-116-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-116-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i3-1000g1_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i3-1000g1_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i3-1000g1_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-116-0-0-0","id":"15656054","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-116-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i3-1000g1%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i3-1000g1:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i3-1000g1:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-116-0-1-0","id":"15655927","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":117,"dataTestId":"vuln-software-config-117","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-117-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-117-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i3-1000g4_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i3-1000g4_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i3-1000g4_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-117-0-0-0","id":"15656055","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-117-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i3-1000g4%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i3-1000g4:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i3-1000g4:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-117-0-1-0","id":"15655928","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":118,"dataTestId":"vuln-software-config-118","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-118-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-118-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i3-1005g1_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i3-1005g1_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i3-1005g1_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-118-0-0-0","id":"15656056","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-118-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i3-1005g1%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i3-1005g1:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i3-1005g1:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-118-0-1-0","id":"15655929","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":119,"dataTestId":"vuln-software-config-119","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-119-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-119-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i9-9900ks_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i9-9900ks_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i9-9900ks_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-119-0-0-0","id":"15656057","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-119-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i9-9900ks%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i9-9900ks:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i9-9900ks:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-119-0-1-0","id":"15655930","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":120,"dataTestId":"vuln-software-config-120","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-120-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-120-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i9-9880h_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i9-9880h_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i9-9880h_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-120-0-0-0","id":"15656058","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-120-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i9-9880h%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i9-9880h:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i9-9880h:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-120-0-1-0","id":"15655931","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":121,"dataTestId":"vuln-software-config-121","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-121-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-121-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i9-9900_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i9-9900_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i9-9900_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-121-0-0-0","id":"15656059","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-121-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i9-9900%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i9-9900:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i9-9900:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-121-0-1-0","id":"15655932","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":122,"dataTestId":"vuln-software-config-122","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-122-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-122-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i9-9900t_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i9-9900t_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i9-9900t_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-122-0-0-0","id":"15656060","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-122-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i9-9900t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i9-9900t:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i9-9900t:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-122-0-1-0","id":"15655933","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":123,"dataTestId":"vuln-software-config-123","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-123-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-123-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i9-9980hk_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i9-9980hk_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i9-9980hk_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-123-0-0-0","id":"15656061","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-123-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i9-9980hk%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i9-9980hk:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i9-9980hk:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-123-0-1-0","id":"15655934","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":124,"dataTestId":"vuln-software-config-124","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-124-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-124-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i9-9900kf_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i9-9900kf_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i9-9900kf_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-124-0-0-0","id":"15656062","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-124-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i9-9900kf%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i9-9900kf:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i9-9900kf:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-124-0-1-0","id":"15655935","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":125,"dataTestId":"vuln-software-config-125","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-125-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-125-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i9-9900k_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i9-9900k_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i9-9900k_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-125-0-0-0","id":"15656063","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-125-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i9-9900k%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i9-9900k:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i9-9900k:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-125-0-1-0","id":"15655936","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":126,"dataTestId":"vuln-software-config-126","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-126-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-126-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i7-9700e_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i7-9700e_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i7-9700e_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-126-0-0-0","id":"15656064","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-126-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i7-9700e%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i7-9700e:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i7-9700e:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-126-0-1-0","id":"15655937","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":127,"dataTestId":"vuln-software-config-127","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-127-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-127-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i7-9700te_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i7-9700te_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i7-9700te_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-127-0-0-0","id":"15656065","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-127-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i7-9700te%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i7-9700te:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i7-9700te:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-127-0-1-0","id":"15655938","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":128,"dataTestId":"vuln-software-config-128","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-128-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-128-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i7-9850he_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i7-9850he_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i7-9850he_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-128-0-0-0","id":"15656193","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-128-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i7-9850he%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i7-9850he:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i7-9850he:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-128-0-1-0","id":"15656066","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":129,"dataTestId":"vuln-software-config-129","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-129-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-129-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i7-9850hl_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i7-9850hl_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i7-9850hl_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-129-0-0-0","id":"15656194","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-129-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i7-9850hl%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i7-9850hl:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i7-9850hl:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-129-0-1-0","id":"15656067","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":130,"dataTestId":"vuln-software-config-130","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-130-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-130-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i7-9700_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i7-9700_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i7-9700_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-130-0-0-0","id":"15656195","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-130-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i7-9700%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i7-9700:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i7-9700:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-130-0-1-0","id":"15656068","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":131,"dataTestId":"vuln-software-config-131","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-131-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-131-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i7-9700f_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i7-9700f_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i7-9700f_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-131-0-0-0","id":"15656196","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-131-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i7-9700f%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i7-9700f:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i7-9700f:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-131-0-1-0","id":"15656069","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":132,"dataTestId":"vuln-software-config-132","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-132-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-132-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i7-9700t_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i7-9700t_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i7-9700t_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-132-0-0-0","id":"15656197","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-132-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i7-9700t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i7-9700t:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i7-9700t:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-132-0-1-0","id":"15656070","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":133,"dataTestId":"vuln-software-config-133","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-133-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-133-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i7-9750h_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i7-9750h_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i7-9750h_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-133-0-0-0","id":"15656198","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-133-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i7-9750h%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i7-9750h:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i7-9750h:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-133-0-1-0","id":"15656071","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":134,"dataTestId":"vuln-software-config-134","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-134-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-134-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i7-9750hf_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i7-9750hf_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i7-9750hf_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-134-0-0-0","id":"15656199","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-134-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i7-9750hf%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i7-9750hf:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i7-9750hf:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-134-0-1-0","id":"15656072","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":135,"dataTestId":"vuln-software-config-135","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-135-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-135-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i7-9850h_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i7-9850h_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i7-9850h_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-135-0-0-0","id":"15656200","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-135-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i7-9850h%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i7-9850h:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i7-9850h:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-135-0-1-0","id":"15656073","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":136,"dataTestId":"vuln-software-config-136","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-136-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-136-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i7-9700kf_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i7-9700kf_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i7-9700kf_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-136-0-0-0","id":"15656201","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-136-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i7-9700kf%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i7-9700kf:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i7-9700kf:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-136-0-1-0","id":"15656074","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":137,"dataTestId":"vuln-software-config-137","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-137-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-137-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i7-9700k_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i7-9700k_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i7-9700k_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-137-0-0-0","id":"15656202","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-137-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i7-9700k%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i7-9700k:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i7-9700k:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-137-0-1-0","id":"15656075","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":138,"dataTestId":"vuln-software-config-138","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-138-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-138-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i5-9500e_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i5-9500e_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i5-9500e_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-138-0-0-0","id":"15656203","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-138-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i5-9500e%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i5-9500e:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i5-9500e:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-138-0-1-0","id":"15656076","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":139,"dataTestId":"vuln-software-config-139","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-139-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-139-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i5-9500te_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i5-9500te_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i5-9500te_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-139-0-0-0","id":"15656077","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-139-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i5-9500te%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i5-9500te:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i5-9500te:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-139-0-1-0","id":"15656204","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":140,"dataTestId":"vuln-software-config-140","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-140-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-140-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i5-9300h_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i5-9300h_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i5-9300h_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-140-0-0-0","id":"15656078","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-140-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i5-9300h%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i5-9300h:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i5-9300h:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-140-0-1-0","id":"15656205","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":141,"dataTestId":"vuln-software-config-141","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-141-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-141-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i5-9400h_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i5-9400h_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i5-9400h_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-141-0-0-0","id":"15656079","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-141-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i5-9400h%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i5-9400h:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i5-9400h:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-141-0-1-0","id":"15656206","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":142,"dataTestId":"vuln-software-config-142","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-142-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-142-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i5-9400t_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i5-9400t_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i5-9400t_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-142-0-0-0","id":"15656080","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-142-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i5-9400t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i5-9400t:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i5-9400t:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-142-0-1-0","id":"15656207","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":143,"dataTestId":"vuln-software-config-143","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-143-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-143-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i5-9500_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i5-9500_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i5-9500_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-143-0-0-0","id":"15656081","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-143-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i5-9500%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i5-9500:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i5-9500:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-143-0-1-0","id":"15656208","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":144,"dataTestId":"vuln-software-config-144","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-144-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-144-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i5-9500f_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i5-9500f_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i5-9500f_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-144-0-0-0","id":"15656082","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-144-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i5-9500f%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i5-9500f:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i5-9500f:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-144-0-1-0","id":"15656209","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":145,"dataTestId":"vuln-software-config-145","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-145-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-145-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i5-9500t_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i5-9500t_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i5-9500t_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-145-0-0-0","id":"15656083","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-145-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i5-9500t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i5-9500t:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i5-9500t:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-145-0-1-0","id":"15656210","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":146,"dataTestId":"vuln-software-config-146","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-146-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-146-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i5-9600_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i5-9600_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i5-9600_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-146-0-0-0","id":"15656084","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-146-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i5-9600%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i5-9600:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i5-9600:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-146-0-1-0","id":"15656211","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":147,"dataTestId":"vuln-software-config-147","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-147-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-147-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i5-9600t_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i5-9600t_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i5-9600t_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-147-0-0-0","id":"15656085","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-147-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i5-9600t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i5-9600t:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i5-9600t:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-147-0-1-0","id":"15656212","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":148,"dataTestId":"vuln-software-config-148","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-148-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-148-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i5-9300hf_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i5-9300hf_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i5-9300hf_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-148-0-0-0","id":"15656086","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-148-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i5-9300hf%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i5-9300hf:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i5-9300hf:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-148-0-1-0","id":"15656213","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":149,"dataTestId":"vuln-software-config-149","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-149-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-149-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i5-9400_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i5-9400_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i5-9400_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-149-0-0-0","id":"15656087","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-149-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i5-9400%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i5-9400:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i5-9400:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-149-0-1-0","id":"15656214","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":150,"dataTestId":"vuln-software-config-150","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-150-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-150-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i5-9400f_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i5-9400f_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i5-9400f_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-150-0-0-0","id":"15656088","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-150-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i5-9400f%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i5-9400f:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i5-9400f:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-150-0-1-0","id":"15656215","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":151,"dataTestId":"vuln-software-config-151","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-151-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-151-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i5-9600kf_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i5-9600kf_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i5-9600kf_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-151-0-0-0","id":"15656089","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-151-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i5-9600kf%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i5-9600kf:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i5-9600kf:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-151-0-1-0","id":"15656216","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":152,"dataTestId":"vuln-software-config-152","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-152-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-152-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i5-9600k_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i5-9600k_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i5-9600k_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-152-0-0-0","id":"15656090","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-152-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i5-9600k%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i5-9600k:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i5-9600k:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-152-0-1-0","id":"15656217","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":153,"dataTestId":"vuln-software-config-153","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-153-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-153-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i3-9100e_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i3-9100e_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i3-9100e_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-153-0-0-0","id":"15656091","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-153-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i3-9100e%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i3-9100e:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i3-9100e:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-153-0-1-0","id":"15656218","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":154,"dataTestId":"vuln-software-config-154","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-154-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-154-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i3-9100hl_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i3-9100hl_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i3-9100hl_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-154-0-0-0","id":"15656092","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-154-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i3-9100hl%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i3-9100hl:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i3-9100hl:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-154-0-1-0","id":"15656219","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":155,"dataTestId":"vuln-software-config-155","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-155-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-155-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i3-9100te_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i3-9100te_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i3-9100te_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-155-0-0-0","id":"15656093","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-155-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i3-9100te%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i3-9100te:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i3-9100te:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-155-0-1-0","id":"15656220","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":156,"dataTestId":"vuln-software-config-156","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-156-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-156-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i3-9100_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i3-9100_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i3-9100_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-156-0-0-0","id":"15656221","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-156-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i3-9100%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i3-9100:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i3-9100:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-156-0-1-0","id":"15656094","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":157,"dataTestId":"vuln-software-config-157","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-157-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-157-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i3-9100f_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i3-9100f_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i3-9100f_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-157-0-0-0","id":"15656222","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-157-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i3-9100f%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i3-9100f:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i3-9100f:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-157-0-1-0","id":"15656095","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":158,"dataTestId":"vuln-software-config-158","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-158-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-158-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i3-9100t_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i3-9100t_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i3-9100t_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-158-0-0-0","id":"15656223","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-158-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i3-9100t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i3-9100t:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i3-9100t:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-158-0-1-0","id":"15656096","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":159,"dataTestId":"vuln-software-config-159","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-159-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-159-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i3-9300_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i3-9300_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i3-9300_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-159-0-0-0","id":"15656224","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-159-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i3-9300%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i3-9300:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i3-9300:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-159-0-1-0","id":"15656097","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":160,"dataTestId":"vuln-software-config-160","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-160-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-160-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i3-9300t_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i3-9300t_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i3-9300t_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-160-0-0-0","id":"15656225","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-160-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i3-9300t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i3-9300t:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i3-9300t:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-160-0-1-0","id":"15656098","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":161,"dataTestId":"vuln-software-config-161","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-161-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-161-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i3-9320_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i3-9320_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i3-9320_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-161-0-0-0","id":"15656226","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-161-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i3-9320%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i3-9320:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i3-9320:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-161-0-1-0","id":"15656099","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":162,"dataTestId":"vuln-software-config-162","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-162-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-162-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i3-9350k_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i3-9350k_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i3-9350k_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-162-0-0-0","id":"15656227","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-162-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i3-9350k%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i3-9350k:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i3-9350k:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-162-0-1-0","id":"15656100","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":163,"dataTestId":"vuln-software-config-163","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-163-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-163-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i3-9350kf_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i3-9350kf_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i3-9350kf_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-163-0-0-0","id":"15656228","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-163-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i3-9350kf%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i3-9350kf:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i3-9350kf:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-163-0-1-0","id":"15656101","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":164,"dataTestId":"vuln-software-config-164","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-164-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-164-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i7-7560u_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i7-7560u_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i7-7560u_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-164-0-0-0","id":"15656229","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-164-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i7-7560u%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i7-7560u:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i7-7560u:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-164-0-1-0","id":"15656102","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":165,"dataTestId":"vuln-software-config-165","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-165-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-165-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i7-7567u_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i7-7567u_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i7-7567u_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-165-0-0-0","id":"15656230","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-165-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i7-7567u%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i7-7567u:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i7-7567u:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-165-0-1-0","id":"15656103","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":166,"dataTestId":"vuln-software-config-166","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-166-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-166-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i7-7600u_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i7-7600u_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i7-7600u_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-166-0-0-0","id":"15656231","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-166-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i7-7600u%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i7-7600u:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i7-7600u:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-166-0-1-0","id":"15656104","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":167,"dataTestId":"vuln-software-config-167","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-167-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-167-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i7-7660u_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i7-7660u_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i7-7660u_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-167-0-0-0","id":"15656232","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-167-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i7-7660u%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i7-7660u:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i7-7660u:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-167-0-1-0","id":"15656105","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":168,"dataTestId":"vuln-software-config-168","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-168-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-168-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i7-7700_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i7-7700_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i7-7700_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-168-0-0-0","id":"15656233","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-168-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i7-7700%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i7-7700:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i7-7700:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-168-0-1-0","id":"15656106","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":169,"dataTestId":"vuln-software-config-169","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-169-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-169-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i7-7700hq_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i7-7700hq_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i7-7700hq_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-169-0-0-0","id":"15656234","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-169-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i7-7700hq%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i7-7700hq:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i7-7700hq:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-169-0-1-0","id":"15656107","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":170,"dataTestId":"vuln-software-config-170","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-170-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-170-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i7-7700k_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i7-7700k_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i7-7700k_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-170-0-0-0","id":"15656235","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-170-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i7-7700k%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i7-7700k:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i7-7700k:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-170-0-1-0","id":"15656108","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":171,"dataTestId":"vuln-software-config-171","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-171-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-171-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i7-7700t_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i7-7700t_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i7-7700t_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-171-0-0-0","id":"15656236","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-171-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i7-7700t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i7-7700t:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i7-7700t:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-171-0-1-0","id":"15656109","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":172,"dataTestId":"vuln-software-config-172","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-172-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-172-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i7-7820eq_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i7-7820eq_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i7-7820eq_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-172-0-0-0","id":"15656237","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-172-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i7-7820eq%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i7-7820eq:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i7-7820eq:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-172-0-1-0","id":"15656110","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":173,"dataTestId":"vuln-software-config-173","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-173-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-173-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i7-7820hk_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i7-7820hk_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i7-7820hk_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-173-0-0-0","id":"15656238","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-173-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i7-7820hk%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i7-7820hk:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i7-7820hk:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-173-0-1-0","id":"15656111","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":174,"dataTestId":"vuln-software-config-174","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-174-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-174-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i7-7820hq_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i7-7820hq_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i7-7820hq_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-174-0-0-0","id":"15656239","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-174-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i7-7820hq%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i7-7820hq:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i7-7820hq:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-174-0-1-0","id":"15656112","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":175,"dataTestId":"vuln-software-config-175","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-175-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-175-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i7-7920hq_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i7-7920hq_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i7-7920hq_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-175-0-0-0","id":"15656240","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-175-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i7-7920hq%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i7-7920hq:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i7-7920hq:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-175-0-1-0","id":"15656113","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":176,"dataTestId":"vuln-software-config-176","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-176-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-176-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i7-7500u_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i7-7500u_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i7-7500u_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-176-0-0-0","id":"15656241","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-176-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i7-7500u%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i7-7500u:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i7-7500u:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-176-0-1-0","id":"15656114","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":177,"dataTestId":"vuln-software-config-177","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-177-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-177-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i7-7y75_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i7-7y75_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i7-7y75_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-177-0-0-0","id":"15656242","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-177-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i7-7y75%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i7-7y75:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i7-7y75:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-177-0-1-0","id":"15656115","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":178,"dataTestId":"vuln-software-config-178","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-178-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-178-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i5-7260u_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i5-7260u_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i5-7260u_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-178-0-0-0","id":"15656243","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-178-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i5-7260u%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i5-7260u:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i5-7260u:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-178-0-1-0","id":"15656116","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":179,"dataTestId":"vuln-software-config-179","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-179-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-179-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i5-7267u_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i5-7267u_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i5-7267u_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-179-0-0-0","id":"15656244","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-179-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i5-7267u%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i5-7267u:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i5-7267u:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-179-0-1-0","id":"15656117","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":180,"dataTestId":"vuln-software-config-180","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-180-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-180-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i5-7287u_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i5-7287u_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i5-7287u_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-180-0-0-0","id":"15656245","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-180-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i5-7287u%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i5-7287u:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i5-7287u:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-180-0-1-0","id":"15656118","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":181,"dataTestId":"vuln-software-config-181","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-181-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-181-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i5-7300hq_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i5-7300hq_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i5-7300hq_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-181-0-0-0","id":"15656246","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-181-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i5-7300hq%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i5-7300hq:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i5-7300hq:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-181-0-1-0","id":"15656119","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":182,"dataTestId":"vuln-software-config-182","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-182-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-182-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i5-7300u_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i5-7300u_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i5-7300u_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-182-0-0-0","id":"15656247","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-182-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i5-7300u%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i5-7300u:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i5-7300u:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-182-0-1-0","id":"15656120","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":183,"dataTestId":"vuln-software-config-183","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-183-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-183-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i5-7360u_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i5-7360u_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i5-7360u_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-183-0-0-0","id":"15656248","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-183-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i5-7360u%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i5-7360u:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i5-7360u:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-183-0-1-0","id":"15656121","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":184,"dataTestId":"vuln-software-config-184","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-184-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-184-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i5-7400_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i5-7400_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i5-7400_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-184-0-0-0","id":"15656249","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-184-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i5-7400%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i5-7400:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i5-7400:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-184-0-1-0","id":"15656122","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":185,"dataTestId":"vuln-software-config-185","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-185-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-185-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i5-7400t_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i5-7400t_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i5-7400t_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-185-0-0-0","id":"15656250","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-185-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i5-7400t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i5-7400t:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i5-7400t:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-185-0-1-0","id":"15656123","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":186,"dataTestId":"vuln-software-config-186","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-186-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-186-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i5-7440eq_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i5-7440eq_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i5-7440eq_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-186-0-0-0","id":"15656251","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-186-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i5-7440eq%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i5-7440eq:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i5-7440eq:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-186-0-1-0","id":"15656124","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":187,"dataTestId":"vuln-software-config-187","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-187-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-187-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i5-7440hq_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i5-7440hq_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i5-7440hq_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-187-0-0-0","id":"15656252","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-187-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i5-7440hq%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i5-7440hq:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i5-7440hq:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-187-0-1-0","id":"15656125","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":188,"dataTestId":"vuln-software-config-188","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-188-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-188-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i5-7442eq_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i5-7442eq_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i5-7442eq_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-188-0-0-0","id":"15656253","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-188-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i5-7442eq%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i5-7442eq:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i5-7442eq:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-188-0-1-0","id":"15656126","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":189,"dataTestId":"vuln-software-config-189","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-189-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-189-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i5-7500_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i5-7500_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i5-7500_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-189-0-0-0","id":"15656254","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-189-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i5-7500%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i5-7500:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i5-7500:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-189-0-1-0","id":"15656127","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":190,"dataTestId":"vuln-software-config-190","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-190-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-190-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i5-7500t_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i5-7500t_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i5-7500t_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-190-0-0-0","id":"15656255","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-190-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i5-7500t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i5-7500t:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i5-7500t:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-190-0-1-0","id":"15656128","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":191,"dataTestId":"vuln-software-config-191","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-191-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-191-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i5-7600_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i5-7600_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i5-7600_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-191-0-0-0","id":"15656256","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-191-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i5-7600%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i5-7600:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i5-7600:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-191-0-1-0","id":"15656129","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":192,"dataTestId":"vuln-software-config-192","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-192-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-192-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i5-7600k_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i5-7600k_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i5-7600k_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-192-0-0-0","id":"15656257","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-192-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i5-7600k%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i5-7600k:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i5-7600k:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-192-0-1-0","id":"15656130","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":193,"dataTestId":"vuln-software-config-193","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-193-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-193-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i5-7600t_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i5-7600t_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i5-7600t_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-193-0-0-0","id":"15656258","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-193-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i5-7600t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i5-7600t:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i5-7600t:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-193-0-1-0","id":"15656131","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":194,"dataTestId":"vuln-software-config-194","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-194-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-194-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i5-7y57_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i5-7y57_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i5-7y57_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-194-0-0-0","id":"15656259","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-194-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i5-7y57%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i5-7y57:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i5-7y57:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-194-0-1-0","id":"15656132","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":195,"dataTestId":"vuln-software-config-195","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-195-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-195-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i5-7200u_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i5-7200u_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i5-7200u_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-195-0-0-0","id":"15656260","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-195-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i5-7200u%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i5-7200u:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i5-7200u:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-195-0-1-0","id":"15656133","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":196,"dataTestId":"vuln-software-config-196","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-196-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-196-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i5-7y54_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i5-7y54_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i5-7y54_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-196-0-0-0","id":"15656134","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-196-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i5-7y54%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i5-7y54:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i5-7y54:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-196-0-1-0","id":"15656261","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":197,"dataTestId":"vuln-software-config-197","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-197-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-197-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i3-7020u_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i3-7020u_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i3-7020u_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-197-0-0-0","id":"15656135","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-197-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i3-7020u%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i3-7020u:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i3-7020u:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-197-0-1-0","id":"15656262","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":198,"dataTestId":"vuln-software-config-198","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-198-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-198-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i3-7130u_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i3-7130u_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i3-7130u_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-198-0-0-0","id":"15656136","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-198-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i3-7130u%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i3-7130u:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i3-7130u:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-198-0-1-0","id":"15656263","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":199,"dataTestId":"vuln-software-config-199","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-199-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-199-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i3-7100_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i3-7100_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i3-7100_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-199-0-0-0","id":"15656137","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-199-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i3-7100%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i3-7100:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i3-7100:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-199-0-1-0","id":"15656264","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":200,"dataTestId":"vuln-software-config-200","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-200-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-200-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i3-7100e_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i3-7100e_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i3-7100e_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-200-0-0-0","id":"15656138","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-200-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i3-7100e%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i3-7100e:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i3-7100e:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-200-0-1-0","id":"15656265","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":201,"dataTestId":"vuln-software-config-201","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-201-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-201-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i3-7100h_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i3-7100h_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i3-7100h_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-201-0-0-0","id":"15656139","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-201-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i3-7100h%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i3-7100h:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i3-7100h:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-201-0-1-0","id":"15656266","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":202,"dataTestId":"vuln-software-config-202","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-202-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-202-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i3-7100t_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i3-7100t_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i3-7100t_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-202-0-0-0","id":"15656140","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-202-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i3-7100t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i3-7100t:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i3-7100t:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-202-0-1-0","id":"15656267","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":203,"dataTestId":"vuln-software-config-203","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-203-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-203-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i3-7101e_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i3-7101e_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i3-7101e_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-203-0-0-0","id":"15656141","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-203-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i3-7101e%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i3-7101e:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i3-7101e:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-203-0-1-0","id":"15656268","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":204,"dataTestId":"vuln-software-config-204","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-204-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-204-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i3-7101te_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i3-7101te_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i3-7101te_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-204-0-0-0","id":"15656142","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-204-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i3-7101te%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i3-7101te:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i3-7101te:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-204-0-1-0","id":"15656269","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":205,"dataTestId":"vuln-software-config-205","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-205-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-205-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i3-7102e_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i3-7102e_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i3-7102e_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-205-0-0-0","id":"15656143","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-205-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i3-7102e%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i3-7102e:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i3-7102e:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-205-0-1-0","id":"15656270","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":206,"dataTestId":"vuln-software-config-206","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-206-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-206-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i3-7167u_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i3-7167u_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i3-7167u_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-206-0-0-0","id":"15656144","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-206-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i3-7167u%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i3-7167u:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i3-7167u:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-206-0-1-0","id":"15656271","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":207,"dataTestId":"vuln-software-config-207","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-207-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-207-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i3-7300_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i3-7300_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i3-7300_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-207-0-0-0","id":"15656145","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-207-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i3-7300%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i3-7300:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i3-7300:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-207-0-1-0","id":"15656272","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":208,"dataTestId":"vuln-software-config-208","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-208-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-208-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i3-7300t_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i3-7300t_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i3-7300t_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-208-0-0-0","id":"15656146","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-208-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i3-7300t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i3-7300t:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i3-7300t:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-208-0-1-0","id":"15656273","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":209,"dataTestId":"vuln-software-config-209","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-209-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-209-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i3-7320_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i3-7320_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i3-7320_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-209-0-0-0","id":"15656147","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-209-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i3-7320%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i3-7320:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i3-7320:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-209-0-1-0","id":"15656274","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":210,"dataTestId":"vuln-software-config-210","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-210-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-210-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i3-7350k_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i3-7350k_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i3-7350k_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-210-0-0-0","id":"15656148","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-210-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i3-7350k%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i3-7350k:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i3-7350k:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-210-0-1-0","id":"15656275","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":211,"dataTestId":"vuln-software-config-211","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-211-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-211-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i3-7100u_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i3-7100u_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i3-7100u_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-211-0-0-0","id":"15656149","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-211-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i3-7100u%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i3-7100u:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i3-7100u:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-211-0-1-0","id":"15656276","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":212,"dataTestId":"vuln-software-config-212","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-212-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-212-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_m3-7y32_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_m3-7y32_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_m3-7y32_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-212-0-0-0","id":"15656150","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-212-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_m3-7y32%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_m3-7y32:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_m3-7y32:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-212-0-1-0","id":"15656277","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":213,"dataTestId":"vuln-software-config-213","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-213-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-213-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_m3-7y30_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_m3-7y30_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_m3-7y30_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-213-0-0-0","id":"15656151","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-213-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_m3-7y30%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_m3-7y30:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_m3-7y30:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-213-0-1-0","id":"15656278","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":214,"dataTestId":"vuln-software-config-214","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-214-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-214-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i9-8950hk_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i9-8950hk_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i9-8950hk_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-214-0-0-0","id":"15656152","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-214-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i9-8950hk%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i9-8950hk:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i9-8950hk:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-214-0-1-0","id":"15656279","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":215,"dataTestId":"vuln-software-config-215","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-215-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-215-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i7-8557u_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i7-8557u_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i7-8557u_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-215-0-0-0","id":"15656153","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-215-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i7-8557u%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i7-8557u:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i7-8557u:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-215-0-1-0","id":"15656280","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":216,"dataTestId":"vuln-software-config-216","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-216-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-216-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i7-8665ue_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i7-8665ue_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i7-8665ue_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-216-0-0-0","id":"15656154","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-216-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i7-8665ue%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i7-8665ue:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i7-8665ue:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-216-0-1-0","id":"15656281","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":217,"dataTestId":"vuln-software-config-217","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-217-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-217-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i7-8569u_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i7-8569u_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i7-8569u_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-217-0-0-0","id":"15656155","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-217-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i7-8569u%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i7-8569u:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i7-8569u:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-217-0-1-0","id":"15656282","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":218,"dataTestId":"vuln-software-config-218","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-218-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-218-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i7-8665u_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i7-8665u_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i7-8665u_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-218-0-0-0","id":"15656156","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-218-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i7-8665u%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i7-8665u:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i7-8665u:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-218-0-1-0","id":"15656283","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":219,"dataTestId":"vuln-software-config-219","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-219-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-219-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i7-8500y_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i7-8500y_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i7-8500y_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-219-0-0-0","id":"15656157","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-219-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i7-8500y%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i7-8500y:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i7-8500y:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-219-0-1-0","id":"15656284","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":220,"dataTestId":"vuln-software-config-220","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-220-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-220-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i7-8565u_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i7-8565u_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i7-8565u_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-220-0-0-0","id":"15656285","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-220-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i7-8565u%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i7-8565u:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i7-8565u:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-220-0-1-0","id":"15656158","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":221,"dataTestId":"vuln-software-config-221","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-221-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-221-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i7-8706g_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i7-8706g_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i7-8706g_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-221-0-0-0","id":"15656286","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-221-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i7-8706g%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i7-8706g:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-221-0-1-0","id":"15656159","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":222,"dataTestId":"vuln-software-config-222","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-222-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-222-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i7-8086k_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i7-8086k_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i7-8086k_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-222-0-0-0","id":"15656287","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-222-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i7-8086k%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i7-8086k:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i7-8086k:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-222-0-1-0","id":"15656160","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":223,"dataTestId":"vuln-software-config-223","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-223-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-223-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i7-8559u_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i7-8559u_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i7-8559u_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-223-0-0-0","id":"15656288","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-223-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i7-8559u%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i7-8559u:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i7-8559u:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-223-0-1-0","id":"15656161","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":224,"dataTestId":"vuln-software-config-224","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-224-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-224-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i7-8700_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i7-8700_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i7-8700_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-224-0-0-0","id":"15656289","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-224-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i7-8700%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i7-8700:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i7-8700:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-224-0-1-0","id":"15656162","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":225,"dataTestId":"vuln-software-config-225","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-225-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-225-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i7-8700b_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i7-8700b_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i7-8700b_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-225-0-0-0","id":"15656290","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-225-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i7-8700b%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i7-8700b:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i7-8700b:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-225-0-1-0","id":"15656163","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":226,"dataTestId":"vuln-software-config-226","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-226-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-226-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i7-8700t_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i7-8700t_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i7-8700t_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-226-0-0-0","id":"15656291","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-226-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i7-8700t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i7-8700t:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i7-8700t:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-226-0-1-0","id":"15656164","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":227,"dataTestId":"vuln-software-config-227","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-227-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-227-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i7-8750h_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i7-8750h_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i7-8750h_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-227-0-0-0","id":"15656292","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-227-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i7-8750h%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i7-8750h:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i7-8750h:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-227-0-1-0","id":"15656165","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":228,"dataTestId":"vuln-software-config-228","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-228-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-228-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i7-8850h_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i7-8850h_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i7-8850h_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-228-0-0-0","id":"15656293","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-228-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i7-8850h%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i7-8850h:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i7-8850h:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-228-0-1-0","id":"15656166","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":229,"dataTestId":"vuln-software-config-229","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-229-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-229-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i7-8705g_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i7-8705g_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i7-8705g_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-229-0-0-0","id":"15656294","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-229-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i7-8705g%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i7-8705g:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i7-8705g:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-229-0-1-0","id":"15656167","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":230,"dataTestId":"vuln-software-config-230","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-230-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-230-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i7-8709g_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i7-8709g_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i7-8709g_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-230-0-0-0","id":"15656295","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-230-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i7-8709g%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i7-8709g:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i7-8709g:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-230-0-1-0","id":"15656168","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":231,"dataTestId":"vuln-software-config-231","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-231-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-231-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i7-8809g_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i7-8809g_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i7-8809g_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-231-0-0-0","id":"15656296","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-231-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i7-8809g%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i7-8809g:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i7-8809g:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-231-0-1-0","id":"15656169","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":232,"dataTestId":"vuln-software-config-232","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-232-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-232-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i7%5C%2B8700_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i7\\+8700_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i7%2b8700_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-232-0-0-0","id":"15656297","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-232-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i7%5C%2B8700%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i7\\+8700:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i7%2b8700:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-232-0-1-0","id":"15656170","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":233,"dataTestId":"vuln-software-config-233","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-233-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-233-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i7-8700k_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i7-8700k_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i7-8700k_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-233-0-0-0","id":"15656298","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-233-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i7-8700k%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i7-8700k:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i7-8700k:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-233-0-1-0","id":"15656171","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":234,"dataTestId":"vuln-software-config-234","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-234-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-234-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i7-8550u_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i7-8550u_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i7-8550u_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-234-0-0-0","id":"15656299","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-234-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i7-8550u%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i7-8550u:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i7-8550u:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-234-0-1-0","id":"15656172","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":235,"dataTestId":"vuln-software-config-235","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-235-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-235-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i7-8650u_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i7-8650u_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i7-8650u_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-235-0-0-0","id":"15656300","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-235-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i7-8650u%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i7-8650u:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i7-8650u:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-235-0-1-0","id":"15656173","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":236,"dataTestId":"vuln-software-config-236","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-236-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-236-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i5-8260u_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i5-8260u_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i5-8260u_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-236-0-0-0","id":"15656301","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-236-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i5-8260u%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i5-8260u:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i5-8260u:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-236-0-1-0","id":"15656174","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":237,"dataTestId":"vuln-software-config-237","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-237-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-237-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i5-8257u_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i5-8257u_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i5-8257u_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-237-0-0-0","id":"15656302","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-237-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i5-8257u%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i5-8257u:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i5-8257u:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-237-0-1-0","id":"15656175","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":238,"dataTestId":"vuln-software-config-238","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-238-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-238-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i5-8365ue_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i5-8365ue_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i5-8365ue_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-238-0-0-0","id":"15656303","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-238-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i5-8365ue%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i5-8365ue:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i5-8365ue:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-238-0-1-0","id":"15656176","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":239,"dataTestId":"vuln-software-config-239","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-239-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-239-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i5-8279u_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i5-8279u_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i5-8279u_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-239-0-0-0","id":"15656304","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-239-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i5-8279u%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i5-8279u:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i5-8279u:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-239-0-1-0","id":"15656177","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":240,"dataTestId":"vuln-software-config-240","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-240-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-240-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i5-8365u_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i5-8365u_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i5-8365u_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-240-0-0-0","id":"15656305","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-240-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i5-8365u%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i5-8365u:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i5-8365u:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-240-0-1-0","id":"15656178","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":241,"dataTestId":"vuln-software-config-241","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-241-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-241-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i5-8310y_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i5-8310y_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i5-8310y_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-241-0-0-0","id":"15656306","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-241-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i5-8310y%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i5-8310y:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i5-8310y:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-241-0-1-0","id":"15656179","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":242,"dataTestId":"vuln-software-config-242","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-242-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-242-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i5-8210y_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i5-8210y_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i5-8210y_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-242-0-0-0","id":"15656307","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-242-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i5-8210y%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i5-8210y:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i5-8210y:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-242-0-1-0","id":"15656180","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":243,"dataTestId":"vuln-software-config-243","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-243-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-243-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i5-8200y_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i5-8200y_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i5-8200y_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-243-0-0-0","id":"15656308","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-243-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i5-8200y%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i5-8200y:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i5-8200y:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-243-0-1-0","id":"15656181","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":244,"dataTestId":"vuln-software-config-244","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-244-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-244-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i5-8265u_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i5-8265u_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i5-8265u_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-244-0-0-0","id":"15656309","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-244-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i5-8265u%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i5-8265u:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i5-8265u:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-244-0-1-0","id":"15656182","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":245,"dataTestId":"vuln-software-config-245","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-245-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-245-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i5-8305g_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i5-8305g_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i5-8305g_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-245-0-0-0","id":"15656310","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-245-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i5-8305g%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i5-8305g:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i5-8305g:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-245-0-1-0","id":"15656183","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":246,"dataTestId":"vuln-software-config-246","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-246-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-246-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i5-8259u_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i5-8259u_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i5-8259u_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-246-0-0-0","id":"15656311","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-246-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i5-8259u%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i5-8259u:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i5-8259u:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-246-0-1-0","id":"15656184","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":247,"dataTestId":"vuln-software-config-247","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-247-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-247-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i5-8269u_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i5-8269u_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i5-8269u_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-247-0-0-0","id":"15656312","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-247-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i5-8269u%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i5-8269u:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i5-8269u:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-247-0-1-0","id":"15656185","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":248,"dataTestId":"vuln-software-config-248","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-248-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-248-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i5-8300h_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i5-8300h_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i5-8300h_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-248-0-0-0","id":"15656313","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-248-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i5-8300h%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i5-8300h:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i5-8300h:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-248-0-1-0","id":"15656186","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":249,"dataTestId":"vuln-software-config-249","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-249-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-249-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i5-8400_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i5-8400_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i5-8400_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-249-0-0-0","id":"15656314","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-249-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i5-8400%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i5-8400:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i5-8400:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-249-0-1-0","id":"15656187","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":250,"dataTestId":"vuln-software-config-250","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-250-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-250-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i5-8400b_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i5-8400b_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i5-8400b_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-250-0-0-0","id":"15656315","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-250-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i5-8400b%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i5-8400b:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i5-8400b:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-250-0-1-0","id":"15656188","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":251,"dataTestId":"vuln-software-config-251","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-251-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-251-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i5-8400h_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i5-8400h_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i5-8400h_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-251-0-0-0","id":"15656316","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-251-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i5-8400h%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i5-8400h:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i5-8400h:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-251-0-1-0","id":"15656189","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":252,"dataTestId":"vuln-software-config-252","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-252-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-252-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i5-8400t_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i5-8400t_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i5-8400t_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-252-0-0-0","id":"15656317","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-252-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i5-8400t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i5-8400t:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i5-8400t:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-252-0-1-0","id":"15656190","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":253,"dataTestId":"vuln-software-config-253","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-253-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-253-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i5-8500_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i5-8500_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i5-8500_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-253-0-0-0","id":"15656318","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-253-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i5-8500%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i5-8500:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i5-8500:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-253-0-1-0","id":"15656191","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":254,"dataTestId":"vuln-software-config-254","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-254-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-254-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i5-8500b_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i5-8500b_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i5-8500b_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-254-0-0-0","id":"15656319","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-254-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i5-8500b%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i5-8500b:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i5-8500b:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-254-0-1-0","id":"15656192","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":255,"dataTestId":"vuln-software-config-255","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-255-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-255-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i5-8500t_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i5-8500t_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i5-8500t_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-255-0-0-0","id":"15656447","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-255-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i5-8500t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i5-8500t:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i5-8500t:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-255-0-1-0","id":"15656320","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":256,"dataTestId":"vuln-software-config-256","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-256-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-256-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i5-8600_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i5-8600_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i5-8600_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-256-0-0-0","id":"15656448","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-256-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i5-8600%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i5-8600:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i5-8600:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-256-0-1-0","id":"15656321","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":257,"dataTestId":"vuln-software-config-257","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-257-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-257-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i5-8600t_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i5-8600t_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i5-8600t_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-257-0-0-0","id":"15656449","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-257-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i5-8600t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i5-8600t:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i5-8600t:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-257-0-1-0","id":"15656322","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":258,"dataTestId":"vuln-software-config-258","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-258-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-258-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i5-8600k_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i5-8600k_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i5-8600k_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-258-0-0-0","id":"15656450","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-258-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i5-8600k%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i5-8600k:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i5-8600k:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-258-0-1-0","id":"15656323","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":259,"dataTestId":"vuln-software-config-259","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-259-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-259-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i5-8250u_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i5-8250u_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i5-8250u_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-259-0-0-0","id":"15656324","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-259-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i5-8250u%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i5-8250u:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i5-8250u:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-259-0-1-0","id":"15656451","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":260,"dataTestId":"vuln-software-config-260","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-260-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-260-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i5-8350u_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i5-8350u_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i5-8350u_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-260-0-0-0","id":"15656325","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-260-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i5-8350u%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i5-8350u:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i5-8350u:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-260-0-1-0","id":"15656452","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":261,"dataTestId":"vuln-software-config-261","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-261-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-261-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i3-8140u_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i3-8140u_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i3-8140u_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-261-0-0-0","id":"15656326","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-261-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i3-8140u%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i3-8140u:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i3-8140u:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-261-0-1-0","id":"15656453","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":262,"dataTestId":"vuln-software-config-262","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-262-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-262-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i3-8145ue_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i3-8145ue_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i3-8145ue_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-262-0-0-0","id":"15656327","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-262-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i3-8145ue%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i3-8145ue:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i3-8145ue:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-262-0-1-0","id":"15656454","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":263,"dataTestId":"vuln-software-config-263","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-263-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-263-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i3-8100b_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i3-8100b_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i3-8100b_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-263-0-0-0","id":"15656328","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-263-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i3-8100b%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i3-8100b:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i3-8100b:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-263-0-1-0","id":"15656455","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":264,"dataTestId":"vuln-software-config-264","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-264-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-264-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i3-8145u_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i3-8145u_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i3-8145u_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-264-0-0-0","id":"15656329","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-264-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i3-8145u%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i3-8145u:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i3-8145u:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-264-0-1-0","id":"15656456","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":265,"dataTestId":"vuln-software-config-265","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-265-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-265-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i3-8100h_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i3-8100h_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i3-8100h_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-265-0-0-0","id":"15656330","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-265-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i3-8100h%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i3-8100h:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i3-8100h:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-265-0-1-0","id":"15656457","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":266,"dataTestId":"vuln-software-config-266","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-266-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-266-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i3-8100t_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i3-8100t_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i3-8100t_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-266-0-0-0","id":"15656331","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-266-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i3-8100t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i3-8100t:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i3-8100t:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-266-0-1-0","id":"15656458","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":267,"dataTestId":"vuln-software-config-267","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-267-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-267-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i3-8109u_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i3-8109u_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i3-8109u_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-267-0-0-0","id":"15656332","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-267-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i3-8109u%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i3-8109u:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i3-8109u:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-267-0-1-0","id":"15656459","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":268,"dataTestId":"vuln-software-config-268","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-268-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-268-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i3-8300_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i3-8300_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i3-8300_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-268-0-0-0","id":"15656460","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-268-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i3-8300%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i3-8300:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i3-8300:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-268-0-1-0","id":"15656333","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":269,"dataTestId":"vuln-software-config-269","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-269-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-269-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i3-8300t_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i3-8300t_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i3-8300t_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-269-0-0-0","id":"15656461","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-269-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i3-8300t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i3-8300t:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i3-8300t:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-269-0-1-0","id":"15656334","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":270,"dataTestId":"vuln-software-config-270","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-270-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-270-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i3-8130u_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i3-8130u_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i3-8130u_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-270-0-0-0","id":"15656462","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-270-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i3-8130u%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i3-8130u:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i3-8130u:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-270-0-1-0","id":"15656335","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":271,"dataTestId":"vuln-software-config-271","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-271-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-271-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i3-8100_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i3-8100_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i3-8100_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-271-0-0-0","id":"15656463","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-271-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i3-8100%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i3-8100:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i3-8100:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-271-0-1-0","id":"15656336","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":272,"dataTestId":"vuln-software-config-272","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-272-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-272-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_i3-8350k_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_i3-8350k_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_i3-8350k_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-272-0-0-0","id":"15656464","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-272-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_i3-8350k%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_i3-8350k:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_i3-8350k:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-272-0-1-0","id":"15656337","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":273,"dataTestId":"vuln-software-config-273","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-273-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-273-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Acore_m3-8100y_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:core_m3-8100y_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:core_m3-8100y_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-273-0-0-0","id":"15656465","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-273-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Acore_m3-8100y%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:core_m3-8100y:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:core_m3-8100y:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-273-0-1-0","id":"15656338","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":274,"dataTestId":"vuln-software-config-274","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-274-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-274-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_w-11155mle_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_w-11155mle_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_w-11155mle_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-274-0-0-0","id":"15656466","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-274-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_w-11155mle%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_w-11155mle:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_w-11155mle:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-274-0-1-0","id":"15656339","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":275,"dataTestId":"vuln-software-config-275","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-275-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-275-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_w-11155mre_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_w-11155mre_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_w-11155mre_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-275-0-0-0","id":"15656467","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-275-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_w-11155mre%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_w-11155mre:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_w-11155mre:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-275-0-1-0","id":"15656340","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":276,"dataTestId":"vuln-software-config-276","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-276-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-276-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_w-11555mle_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_w-11555mle_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_w-11555mle_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-276-0-0-0","id":"15656468","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-276-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_w-11555mle%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_w-11555mle:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_w-11555mle:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-276-0-1-0","id":"15656341","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":277,"dataTestId":"vuln-software-config-277","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-277-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-277-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_w-11555mre_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_w-11555mre_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_w-11555mre_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-277-0-0-0","id":"15656469","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-277-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_w-11555mre%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_w-11555mre:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_w-11555mre:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-277-0-1-0","id":"15656342","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":278,"dataTestId":"vuln-software-config-278","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-278-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-278-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_w-11865mle_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_w-11865mle_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_w-11865mle_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-278-0-0-0","id":"15656470","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-278-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_w-11865mle%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_w-11865mle:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_w-11865mle:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-278-0-1-0","id":"15656343","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":279,"dataTestId":"vuln-software-config-279","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-279-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-279-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_w-11865mre_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_w-11865mre_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_w-11865mre_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-279-0-0-0","id":"15656471","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-279-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_w-11865mre%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_w-11865mre:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_w-11865mre:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-279-0-1-0","id":"15656344","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":280,"dataTestId":"vuln-software-config-280","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-280-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-280-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_w-3323_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_w-3323_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_w-3323_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-280-0-0-0","id":"15656472","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-280-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_w-3323%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_w-3323:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_w-3323:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-280-0-1-0","id":"15656345","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":281,"dataTestId":"vuln-software-config-281","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-281-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-281-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_w-3335_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_w-3335_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_w-3335_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-281-0-0-0","id":"15656473","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-281-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_w-3335%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_w-3335:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_w-3335:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-281-0-1-0","id":"15656346","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":282,"dataTestId":"vuln-software-config-282","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-282-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-282-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_w-3345_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_w-3345_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_w-3345_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-282-0-0-0","id":"15656474","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-282-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_w-3345%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_w-3345:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_w-3345:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-282-0-1-0","id":"15656347","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":283,"dataTestId":"vuln-software-config-283","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-283-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-283-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_w-3365_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_w-3365_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_w-3365_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-283-0-0-0","id":"15656475","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-283-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_w-3365%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_w-3365:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_w-3365:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-283-0-1-0","id":"15656348","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":284,"dataTestId":"vuln-software-config-284","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-284-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-284-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_w-3375_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_w-3375_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_w-3375_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-284-0-0-0","id":"15656476","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-284-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_w-3375%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_w-3375:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_w-3375:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-284-0-1-0","id":"15656349","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":285,"dataTestId":"vuln-software-config-285","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-285-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-285-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_w-11855m_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_w-11855m_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_w-11855m_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-285-0-0-0","id":"15656477","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-285-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_w-11855m%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_w-11855m:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_w-11855m:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-285-0-1-0","id":"15656350","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":286,"dataTestId":"vuln-software-config-286","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-286-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-286-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_w-11955m_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_w-11955m_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_w-11955m_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-286-0-0-0","id":"15656478","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-286-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_w-11955m%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_w-11955m:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_w-11955m:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-286-0-1-0","id":"15656351","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":287,"dataTestId":"vuln-software-config-287","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-287-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-287-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_w-1350_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_w-1350_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_w-1350_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-287-0-0-0","id":"15656479","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-287-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_w-1350%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_w-1350:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_w-1350:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-287-0-1-0","id":"15656352","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":288,"dataTestId":"vuln-software-config-288","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-288-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-288-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_w-1350p_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_w-1350p_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_w-1350p_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-288-0-0-0","id":"15656480","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-288-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_w-1350p%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_w-1350p:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_w-1350p:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-288-0-1-0","id":"15656353","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":289,"dataTestId":"vuln-software-config-289","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-289-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-289-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_w-1370_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_w-1370_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_w-1370_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-289-0-0-0","id":"15656481","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-289-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_w-1370%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_w-1370:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_w-1370:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-289-0-1-0","id":"15656354","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":290,"dataTestId":"vuln-software-config-290","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-290-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-290-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_w-1370p_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_w-1370p_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_w-1370p_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-290-0-0-0","id":"15656482","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-290-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_w-1370p%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_w-1370p:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_w-1370p:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-290-0-1-0","id":"15656355","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":291,"dataTestId":"vuln-software-config-291","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-291-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-291-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_w-1390_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_w-1390_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_w-1390_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-291-0-0-0","id":"15656483","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-291-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_w-1390%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_w-1390:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_w-1390:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-291-0-1-0","id":"15656356","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":292,"dataTestId":"vuln-software-config-292","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-292-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-292-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_w-1390p_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_w-1390p_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_w-1390p_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-292-0-0-0","id":"15656484","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-292-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_w-1390p%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_w-1390p:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_w-1390p:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-292-0-1-0","id":"15656357","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":293,"dataTestId":"vuln-software-config-293","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-293-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-293-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_w-1390t_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_w-1390t_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_w-1390t_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-293-0-0-0","id":"15656494","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-293-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_w-1390t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_w-1390t:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_w-1390t:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-293-0-1-0","id":"15656367","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":294,"dataTestId":"vuln-software-config-294","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-294-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-294-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_w-10855m_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_w-10855m_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_w-10855m_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-294-0-0-0","id":"15656525","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-294-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_w-10855m%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_w-10855m:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_w-10855m:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-294-0-1-0","id":"15656399","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":295,"dataTestId":"vuln-software-config-295","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-295-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-295-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_w-10885m_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_w-10885m_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_w-10885m_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-295-0-0-0","id":"15656526","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-295-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_w-10885m%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_w-10885m:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_w-10885m:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-295-0-1-0","id":"15656400","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":296,"dataTestId":"vuln-software-config-296","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-296-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-296-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_w-1250_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_w-1250_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_w-1250_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-296-0-0-0","id":"15656527","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-296-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_w-1250%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_w-1250:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_w-1250:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-296-0-1-0","id":"15656401","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":297,"dataTestId":"vuln-software-config-297","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-297-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-297-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_w-1250e_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_w-1250e_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_w-1250e_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-297-0-0-0","id":"15656528","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-297-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_w-1250e%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_w-1250e:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_w-1250e:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-297-0-1-0","id":"15656402","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":298,"dataTestId":"vuln-software-config-298","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-298-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-298-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_w-1250p_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_w-1250p_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_w-1250p_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-298-0-0-0","id":"15656529","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-298-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_w-1250p%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_w-1250p:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_w-1250p:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-298-0-1-0","id":"15656403","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":299,"dataTestId":"vuln-software-config-299","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-299-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-299-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_w-1250te_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_w-1250te_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_w-1250te_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-299-0-0-0","id":"15656530","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-299-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_w-1250te%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_w-1250te:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_w-1250te:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-299-0-1-0","id":"15656404","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":300,"dataTestId":"vuln-software-config-300","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-300-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-300-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_w-1270_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_w-1270_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_w-1270_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-300-0-0-0","id":"15656531","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-300-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_w-1270%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_w-1270:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_w-1270:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-300-0-1-0","id":"15656405","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":301,"dataTestId":"vuln-software-config-301","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-301-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-301-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_w-1270e_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_w-1270e_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_w-1270e_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-301-0-0-0","id":"15656532","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-301-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_w-1270e%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_w-1270e:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_w-1270e:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-301-0-1-0","id":"15656406","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":302,"dataTestId":"vuln-software-config-302","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-302-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-302-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_w-1270p_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_w-1270p_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_w-1270p_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-302-0-0-0","id":"15656533","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-302-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_w-1270p%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_w-1270p:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_w-1270p:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-302-0-1-0","id":"15656407","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":303,"dataTestId":"vuln-software-config-303","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-303-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-303-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_w-1270te_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_w-1270te_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_w-1270te_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-303-0-0-0","id":"15656534","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-303-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_w-1270te%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_w-1270te:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_w-1270te:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-303-0-1-0","id":"15656408","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":304,"dataTestId":"vuln-software-config-304","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-304-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-304-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_w-1290_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_w-1290_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_w-1290_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-304-0-0-0","id":"15656535","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-304-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_w-1290%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_w-1290:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_w-1290:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-304-0-1-0","id":"15656409","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":305,"dataTestId":"vuln-software-config-305","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-305-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-305-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_w-1290e_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_w-1290e_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_w-1290e_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-305-0-0-0","id":"15656536","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-305-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_w-1290e%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_w-1290e:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_w-1290e:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-305-0-1-0","id":"15656410","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":306,"dataTestId":"vuln-software-config-306","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-306-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-306-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_w-1290p_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_w-1290p_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_w-1290p_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-306-0-0-0","id":"15656537","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-306-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_w-1290p%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_w-1290p:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_w-1290p:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-306-0-1-0","id":"15656411","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":307,"dataTestId":"vuln-software-config-307","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-307-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-307-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_w-1290t_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_w-1290t_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_w-1290t_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-307-0-0-0","id":"15656538","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-307-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_w-1290t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_w-1290t:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_w-1290t:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-307-0-1-0","id":"15656412","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":308,"dataTestId":"vuln-software-config-308","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-308-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-308-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_w-1290te_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_w-1290te_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_w-1290te_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-308-0-0-0","id":"15656539","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-308-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_w-1290te%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_w-1290te:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_w-1290te:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-308-0-1-0","id":"15656413","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":309,"dataTestId":"vuln-software-config-309","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-309-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-309-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_w-2223_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_w-2223_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_w-2223_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-309-0-0-0","id":"15656540","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-309-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_w-2223%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_w-2223:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_w-2223:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-309-0-1-0","id":"15656414","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":310,"dataTestId":"vuln-software-config-310","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-310-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-310-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_w-2225_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_w-2225_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_w-2225_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-310-0-0-0","id":"15656541","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-310-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_w-2225%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_w-2225:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_w-2225:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-310-0-1-0","id":"15656415","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":311,"dataTestId":"vuln-software-config-311","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-311-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-311-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_w-2235_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_w-2235_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_w-2235_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-311-0-0-0","id":"15656542","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-311-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_w-2235%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_w-2235:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_w-2235:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-311-0-1-0","id":"15656416","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":312,"dataTestId":"vuln-software-config-312","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-312-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-312-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_w-2245_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_w-2245_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_w-2245_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-312-0-0-0","id":"15656543","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-312-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_w-2245%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_w-2245:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_w-2245:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-312-0-1-0","id":"15656544","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":313,"dataTestId":"vuln-software-config-313","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-313-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-313-0-0","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_w-2255%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_w-2255:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_w-2255:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-313-0-0-0","id":"15656545","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-313-0-1","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_w-2255_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_w-2255_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_w-2255_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-313-0-1-0","id":"15656417","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":314,"dataTestId":"vuln-software-config-314","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-314-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-314-0-0","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_w-2265%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_w-2265:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_w-2265:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-314-0-0-0","id":"15656548","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-314-0-1","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_w-2265_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_w-2265_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_w-2265_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-314-0-1-0","id":"15656420","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":315,"dataTestId":"vuln-software-config-315","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-315-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-315-0-0","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_w-2275%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_w-2275:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_w-2275:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-315-0-0-0","id":"15656549","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-315-0-1","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_w-2275_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_w-2275_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_w-2275_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-315-0-1-0","id":"15656421","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":316,"dataTestId":"vuln-software-config-316","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-316-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-316-0-0","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_w-2295%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_w-2295:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_w-2295:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-316-0-0-0","id":"15656495","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-316-0-1","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_w-2295_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_w-2295_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_w-2295_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-316-0-1-0","id":"15656368","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":317,"dataTestId":"vuln-software-config-317","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-317-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-317-0-0","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_w-3223%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_w-3223:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_w-3223:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-317-0-0-0","id":"15656496","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-317-0-1","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_w-3223_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_w-3223_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_w-3223_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-317-0-1-0","id":"15656369","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":318,"dataTestId":"vuln-software-config-318","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-318-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-318-0-0","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_w-3225%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_w-3225:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_w-3225:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-318-0-0-0","id":"15656497","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-318-0-1","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_w-3225_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_w-3225_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_w-3225_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-318-0-1-0","id":"15656370","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":319,"dataTestId":"vuln-software-config-319","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-319-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-319-0-0","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_w-3235%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_w-3235:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_w-3235:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-319-0-0-0","id":"15656498","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-319-0-1","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_w-3235_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_w-3235_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_w-3235_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-319-0-1-0","id":"15656371","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":320,"dataTestId":"vuln-software-config-320","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-320-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-320-0-0","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_w-3245%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_w-3245:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_w-3245:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-320-0-0-0","id":"15656372","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-320-0-1","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_w-3245_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_w-3245_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_w-3245_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-320-0-1-0","id":"15656499","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":321,"dataTestId":"vuln-software-config-321","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-321-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-321-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_w-3245m_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_w-3245m_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_w-3245m_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-321-0-0-0","id":"15656500","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-321-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_w-3245m%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_w-3245m:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_w-3245m:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-321-0-1-0","id":"15656373","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":322,"dataTestId":"vuln-software-config-322","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-322-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-322-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_w-3265_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_w-3265_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_w-3265_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-322-0-0-0","id":"15656501","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-322-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_w-3265%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_w-3265:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_w-3265:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-322-0-1-0","id":"15656374","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":323,"dataTestId":"vuln-software-config-323","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-323-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-323-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_w-3265m_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_w-3265m_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_w-3265m_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-323-0-0-0","id":"15656502","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-323-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_w-3265m%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_w-3265m:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_w-3265m:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-323-0-1-0","id":"15656375","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":324,"dataTestId":"vuln-software-config-324","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-324-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-324-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_w-3275_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_w-3275_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_w-3275_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-324-0-0-0","id":"15656503","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-324-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_w-3275%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_w-3275:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_w-3275:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-324-0-1-0","id":"15656376","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":325,"dataTestId":"vuln-software-config-325","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-325-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-325-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_w-3275m_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_w-3275m_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_w-3275m_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-325-0-0-0","id":"15656504","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-325-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_w-3275m%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_w-3275m:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_w-3275m:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-325-0-1-0","id":"15656377","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":326,"dataTestId":"vuln-software-config-326","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-326-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-326-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_w-3175x_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_w-3175x_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_w-3175x_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-326-0-0-0","id":"15656505","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-326-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_w-3175x%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_w-3175x:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_w-3175x:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-326-0-1-0","id":"15656378","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":327,"dataTestId":"vuln-software-config-327","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-327-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-327-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_w-2123_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_w-2123_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_w-2123_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-327-0-0-0","id":"15656506","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-327-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_w-2123%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_w-2123:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_w-2123:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-327-0-1-0","id":"15656379","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":328,"dataTestId":"vuln-software-config-328","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-328-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-328-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_w-2125_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_w-2125_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_w-2125_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-328-0-0-0","id":"15656507","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-328-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_w-2125%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_w-2125:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_w-2125:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-328-0-1-0","id":"15656380","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":329,"dataTestId":"vuln-software-config-329","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-329-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-329-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_w-2133_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_w-2133_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_w-2133_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-329-0-0-0","id":"15656508","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-329-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_w-2133%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_w-2133:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_w-2133:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-329-0-1-0","id":"15656381","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":330,"dataTestId":"vuln-software-config-330","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-330-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-330-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_w-2135_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_w-2135_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_w-2135_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-330-0-0-0","id":"15656509","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-330-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_w-2135%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_w-2135:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_w-2135:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-330-0-1-0","id":"15656382","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":331,"dataTestId":"vuln-software-config-331","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-331-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-331-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_w-2145_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_w-2145_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_w-2145_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-331-0-0-0","id":"15656510","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-331-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_w-2145%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_w-2145:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_w-2145:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-331-0-1-0","id":"15656383","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":332,"dataTestId":"vuln-software-config-332","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-332-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-332-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_w-2155_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_w-2155_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_w-2155_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-332-0-0-0","id":"15656384","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-332-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_w-2155%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_w-2155:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_w-2155:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-332-0-1-0","id":"15656511","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":333,"dataTestId":"vuln-software-config-333","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-333-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-333-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_w-2175_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_w-2175_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_w-2175_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-333-0-0-0","id":"15656385","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-333-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_w-2175%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_w-2175:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_w-2175:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-333-0-1-0","id":"15656512","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":334,"dataTestId":"vuln-software-config-334","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-334-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-334-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_w-2195_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_w-2195_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_w-2195_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-334-0-0-0","id":"15656386","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-334-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_w-2195%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_w-2195:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_w-2195:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-334-0-1-0","id":"15656513","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":335,"dataTestId":"vuln-software-config-335","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-335-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-335-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_gold_6138p_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_gold_6138p_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_gold_6138p_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-335-0-0-0","id":"15656387","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-335-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_gold_6138p%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_gold_6138p:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_gold_6138p:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-335-0-1-0","id":"15656514","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":336,"dataTestId":"vuln-software-config-336","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-336-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-336-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_bronze_3104_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_bronze_3104_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_bronze_3104_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-336-0-0-0","id":"15656388","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-336-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_bronze_3104%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_bronze_3104:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_bronze_3104:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-336-0-1-0","id":"15656515","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":337,"dataTestId":"vuln-software-config-337","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-337-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-337-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_bronze_3106_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_bronze_3106_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_bronze_3106_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-337-0-0-0","id":"15656389","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-337-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_bronze_3106%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_bronze_3106:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_bronze_3106:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-337-0-1-0","id":"15656516","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":338,"dataTestId":"vuln-software-config-338","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-338-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-338-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_gold_5115_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_gold_5115_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_gold_5115_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-338-0-0-0","id":"15656418","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-338-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_gold_5115%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_gold_5115:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_gold_5115:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-338-0-1-0","id":"15656546","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":339,"dataTestId":"vuln-software-config-339","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-339-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-339-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_gold_5118_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_gold_5118_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_gold_5118_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-339-0-0-0","id":"15656419","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-339-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_gold_5118%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_gold_5118:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_gold_5118:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-339-0-1-0","id":"15656547","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":340,"dataTestId":"vuln-software-config-340","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-340-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-340-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_gold_5119t_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_gold_5119t_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_gold_5119t_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-340-0-0-0","id":"15656358","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-340-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_gold_5119t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_gold_5119t:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_gold_5119t:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-340-0-1-0","id":"15656485","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":341,"dataTestId":"vuln-software-config-341","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-341-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-341-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_gold_5120_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_gold_5120_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_gold_5120_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-341-0-0-0","id":"15656359","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-341-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_gold_5120%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_gold_5120:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_gold_5120:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-341-0-1-0","id":"15656486","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":342,"dataTestId":"vuln-software-config-342","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-342-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-342-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_gold_5120t_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_gold_5120t_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_gold_5120t_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-342-0-0-0","id":"15656360","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-342-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_gold_5120t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_gold_5120t:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_gold_5120t:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-342-0-1-0","id":"15656487","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":343,"dataTestId":"vuln-software-config-343","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-343-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-343-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_gold_5122_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_gold_5122_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_gold_5122_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-343-0-0-0","id":"15656361","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-343-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_gold_5122%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_gold_5122:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_gold_5122:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-343-0-1-0","id":"15656488","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":344,"dataTestId":"vuln-software-config-344","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-344-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-344-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_gold_6126_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_gold_6126_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_gold_6126_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-344-0-0-0","id":"15656362","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-344-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_gold_6126%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_gold_6126:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_gold_6126:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-344-0-1-0","id":"15656489","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":345,"dataTestId":"vuln-software-config-345","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-345-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-345-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_gold_6126f_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_gold_6126f_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_gold_6126f_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-345-0-0-0","id":"15656363","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-345-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_gold_6126f%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_gold_6126f:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_gold_6126f:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-345-0-1-0","id":"15656490","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":346,"dataTestId":"vuln-software-config-346","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-346-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-346-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_gold_6126t_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_gold_6126t_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_gold_6126t_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-346-0-0-0","id":"15656364","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-346-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_gold_6126t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_gold_6126t:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_gold_6126t:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-346-0-1-0","id":"15656491","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":347,"dataTestId":"vuln-software-config-347","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-347-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-347-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_gold_6128_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_gold_6128_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_gold_6128_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-347-0-0-0","id":"15656365","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-347-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_gold_6128%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_gold_6128:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_gold_6128:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-347-0-1-0","id":"15656492","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":348,"dataTestId":"vuln-software-config-348","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-348-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-348-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_gold_6130_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_gold_6130_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_gold_6130_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-348-0-0-0","id":"15656366","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-348-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_gold_6130%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_gold_6130:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_gold_6130:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-348-0-1-0","id":"15656493","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":349,"dataTestId":"vuln-software-config-349","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-349-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-349-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_gold_6130f_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_gold_6130f_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_gold_6130f_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-349-0-0-0","id":"15656390","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-349-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_gold_6130f%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_gold_6130f:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_gold_6130f:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-349-0-1-0","id":"15656517","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":350,"dataTestId":"vuln-software-config-350","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-350-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-350-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_gold_6130t_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_gold_6130t_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_gold_6130t_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-350-0-0-0","id":"15656391","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-350-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_gold_6130t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_gold_6130t:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_gold_6130t:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-350-0-1-0","id":"15656518","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":351,"dataTestId":"vuln-software-config-351","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-351-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-351-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_gold_6132_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_gold_6132_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_gold_6132_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-351-0-0-0","id":"15656392","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-351-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_gold_6132%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_gold_6132:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_gold_6132:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-351-0-1-0","id":"15656519","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":352,"dataTestId":"vuln-software-config-352","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-352-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-352-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_gold_6134_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_gold_6134_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_gold_6134_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-352-0-0-0","id":"15656393","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-352-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_gold_6134%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_gold_6134:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_gold_6134:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-352-0-1-0","id":"15656520","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":353,"dataTestId":"vuln-software-config-353","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-353-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-353-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_gold_6136_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_gold_6136_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_gold_6136_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-353-0-0-0","id":"15656394","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-353-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_gold_6136%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_gold_6136:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_gold_6136:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-353-0-1-0","id":"15656521","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":354,"dataTestId":"vuln-software-config-354","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-354-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-354-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_gold_6138_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_gold_6138_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_gold_6138_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-354-0-0-0","id":"15656395","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-354-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_gold_6138%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_gold_6138:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_gold_6138:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-354-0-1-0","id":"15656522","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":355,"dataTestId":"vuln-software-config-355","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-355-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-355-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_gold_6138f_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_gold_6138f_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_gold_6138f_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-355-0-0-0","id":"15656396","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-355-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_gold_6138f%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_gold_6138f:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_gold_6138f:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-355-0-1-0","id":"15656523","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":356,"dataTestId":"vuln-software-config-356","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-356-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-356-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_gold_6138t_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_gold_6138t_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_gold_6138t_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-356-0-0-0","id":"15656397","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-356-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_gold_6138t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_gold_6138t:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_gold_6138t:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-356-0-1-0","id":"15656524","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":357,"dataTestId":"vuln-software-config-357","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-357-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-357-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_gold_6140_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_gold_6140_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_gold_6140_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-357-0-0-0","id":"15656398","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-357-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_gold_6140%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_gold_6140:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_gold_6140:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-357-0-1-0","id":"15656616","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":358,"dataTestId":"vuln-software-config-358","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-358-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-358-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_gold_6142_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_gold_6142_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_gold_6142_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-358-0-0-0","id":"15656702","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-358-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_gold_6142%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_gold_6142:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_gold_6142:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-358-0-1-0","id":"15656617","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":359,"dataTestId":"vuln-software-config-359","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-359-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-359-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_gold_6142f_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_gold_6142f_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_gold_6142f_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-359-0-0-0","id":"15656703","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-359-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_gold_6142f%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_gold_6142f:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_gold_6142f:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-359-0-1-0","id":"15656618","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":360,"dataTestId":"vuln-software-config-360","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-360-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-360-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_gold_6144_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_gold_6144_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_gold_6144_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-360-0-0-0","id":"15656704","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-360-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_gold_6144%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_gold_6144:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_gold_6144:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-360-0-1-0","id":"15656619","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":361,"dataTestId":"vuln-software-config-361","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-361-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-361-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_gold_6146_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_gold_6146_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_gold_6146_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-361-0-0-0","id":"15656705","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-361-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_gold_6146%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_gold_6146:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_gold_6146:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-361-0-1-0","id":"15656620","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":362,"dataTestId":"vuln-software-config-362","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-362-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-362-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_gold_6148_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_gold_6148_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_gold_6148_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-362-0-0-0","id":"15656701","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-362-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_gold_6148%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_gold_6148:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_gold_6148:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-362-0-1-0","id":"15656615","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":363,"dataTestId":"vuln-software-config-363","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-363-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-363-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_gold_6148f_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_gold_6148f_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_gold_6148f_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-363-0-0-0","id":"15656681","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-363-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_gold_6148f%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_gold_6148f:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_gold_6148f:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-363-0-1-0","id":"15656594","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":364,"dataTestId":"vuln-software-config-364","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-364-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-364-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_gold_6150_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_gold_6150_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_gold_6150_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-364-0-0-0","id":"15656695","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-364-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_gold_6150%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_gold_6150:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_gold_6150:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-364-0-1-0","id":"15656609","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":365,"dataTestId":"vuln-software-config-365","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-365-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-365-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_gold_6152_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_gold_6152_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_gold_6152_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-365-0-0-0","id":"15656696","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-365-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_gold_6152%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_gold_6152:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_gold_6152:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-365-0-1-0","id":"15656610","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":366,"dataTestId":"vuln-software-config-366","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-366-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-366-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_gold_6154_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_gold_6154_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_gold_6154_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-366-0-0-0","id":"15656697","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-366-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_gold_6154%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_gold_6154:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_gold_6154:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-366-0-1-0","id":"15656611","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":367,"dataTestId":"vuln-software-config-367","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-367-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-367-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_platinum_8153_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_platinum_8153_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_platinum_8153_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-367-0-0-0","id":"15656698","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-367-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_platinum_8153%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_platinum_8153:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_platinum_8153:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-367-0-1-0","id":"15656612","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":368,"dataTestId":"vuln-software-config-368","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-368-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-368-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_platinum_8156_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_platinum_8156_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_platinum_8156_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-368-0-0-0","id":"15656699","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-368-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_platinum_8156%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_platinum_8156:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_platinum_8156:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-368-0-1-0","id":"15656613","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":369,"dataTestId":"vuln-software-config-369","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-369-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-369-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_platinum_8158_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_platinum_8158_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_platinum_8158_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-369-0-0-0","id":"15656700","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-369-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_platinum_8158%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_platinum_8158:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_platinum_8158:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-369-0-1-0","id":"15656614","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":370,"dataTestId":"vuln-software-config-370","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-370-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-370-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_platinum_8160_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_platinum_8160_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_platinum_8160_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-370-0-0-0","id":"15656623","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-370-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_platinum_8160%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_platinum_8160:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_platinum_8160:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-370-0-1-0","id":"15656708","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":371,"dataTestId":"vuln-software-config-371","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-371-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-371-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_platinum_8160f_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_platinum_8160f_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_platinum_8160f_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-371-0-0-0","id":"15656624","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-371-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_platinum_8160f%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_platinum_8160f:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_platinum_8160f:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-371-0-1-0","id":"15656709","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":372,"dataTestId":"vuln-software-config-372","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-372-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-372-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_platinum_8160t_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_platinum_8160t_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_platinum_8160t_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-372-0-0-0","id":"15656625","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-372-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_platinum_8160t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_platinum_8160t:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_platinum_8160t:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-372-0-1-0","id":"15656710","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":373,"dataTestId":"vuln-software-config-373","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-373-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-373-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_platinum_8164_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_platinum_8164_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_platinum_8164_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-373-0-0-0","id":"15656626","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-373-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_platinum_8164%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_platinum_8164:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_platinum_8164:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-373-0-1-0","id":"15656711","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":374,"dataTestId":"vuln-software-config-374","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-374-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-374-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_platinum_8168_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_platinum_8168_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_platinum_8168_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-374-0-0-0","id":"15656627","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-374-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_platinum_8168%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_platinum_8168:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_platinum_8168:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-374-0-1-0","id":"15656712","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":375,"dataTestId":"vuln-software-config-375","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-375-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-375-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_platinum_8170_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_platinum_8170_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_platinum_8170_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-375-0-0-0","id":"15656628","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-375-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_platinum_8170%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_platinum_8170:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_platinum_8170:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-375-0-1-0","id":"15656713","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":376,"dataTestId":"vuln-software-config-376","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-376-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-376-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_platinum_8176_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_platinum_8176_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_platinum_8176_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-376-0-0-0","id":"15656629","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-376-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_platinum_8176%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_platinum_8176:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_platinum_8176:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-376-0-1-0","id":"15656714","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":377,"dataTestId":"vuln-software-config-377","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-377-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-377-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_platinum_8176f_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_platinum_8176f_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_platinum_8176f_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-377-0-0-0","id":"15656630","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-377-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_platinum_8176f%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_platinum_8176f:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_platinum_8176f:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-377-0-1-0","id":"15656715","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":378,"dataTestId":"vuln-software-config-378","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-378-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-378-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_platinum_8180_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_platinum_8180_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_platinum_8180_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-378-0-0-0","id":"15656631","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-378-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_platinum_8180%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_platinum_8180:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_platinum_8180:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-378-0-1-0","id":"15656716","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":379,"dataTestId":"vuln-software-config-379","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-379-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-379-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_silver_4108_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_silver_4108_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_silver_4108_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-379-0-0-0","id":"15656632","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-379-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_silver_4108%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_silver_4108:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_silver_4108:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-379-0-1-0","id":"15656717","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":380,"dataTestId":"vuln-software-config-380","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-380-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-380-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_silver_4109t_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_silver_4109t_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_silver_4109t_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-380-0-0-0","id":"15656633","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-380-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_silver_4109t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_silver_4109t:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_silver_4109t:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-380-0-1-0","id":"15656718","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":381,"dataTestId":"vuln-software-config-381","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-381-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-381-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_silver_4110_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_silver_4110_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_silver_4110_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-381-0-0-0","id":"15656634","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-381-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_silver_4110%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_silver_4110:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_silver_4110:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-381-0-1-0","id":"15656719","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":382,"dataTestId":"vuln-software-config-382","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-382-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-382-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_silver_4112_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_silver_4112_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_silver_4112_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-382-0-0-0","id":"15656635","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-382-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_silver_4112%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_silver_4112:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_silver_4112:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-382-0-1-0","id":"15656720","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":383,"dataTestId":"vuln-software-config-383","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-383-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-383-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_silver_4114_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_silver_4114_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_silver_4114_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-383-0-0-0","id":"15656636","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-383-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_silver_4114%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_silver_4114:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_silver_4114:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-383-0-1-0","id":"15656721","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":384,"dataTestId":"vuln-software-config-384","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-384-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-384-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_silver_4114t_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_silver_4114t_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_silver_4114t_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-384-0-0-0","id":"15656637","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-384-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_silver_4114t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_silver_4114t:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_silver_4114t:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-384-0-1-0","id":"15656722","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":385,"dataTestId":"vuln-software-config-385","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-385-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-385-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_silver_4116_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_silver_4116_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_silver_4116_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-385-0-0-0","id":"15656599","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-385-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_silver_4116%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_silver_4116:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_silver_4116:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-385-0-1-0","id":"15656686","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":386,"dataTestId":"vuln-software-config-386","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-386-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-386-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_silver_4116t_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_silver_4116t_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_silver_4116t_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-386-0-0-0","id":"15656600","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-386-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_silver_4116t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_silver_4116t:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_silver_4116t:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-386-0-1-0","id":"15656687","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":387,"dataTestId":"vuln-software-config-387","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-387-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-387-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1702_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1702_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1702_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-387-0-0-0","id":"15656601","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-387-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1702%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1702:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1702:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-387-0-1-0","id":"15656688","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":388,"dataTestId":"vuln-software-config-388","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-388-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-388-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1712tr_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1712tr_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1712tr_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-388-0-0-0","id":"15656728","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-388-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1712tr%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1712tr:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1712tr:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-388-0-1-0","id":"15656643","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":389,"dataTestId":"vuln-software-config-389","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-389-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-389-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1713nt_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1713nt_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1713nt_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-389-0-0-0","id":"15656729","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-389-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1713nt%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1713nt:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1713nt:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-389-0-1-0","id":"15656644","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":390,"dataTestId":"vuln-software-config-390","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-390-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-390-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1713nte_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1713nte_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1713nte_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-390-0-0-0","id":"15656730","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-390-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1713nte%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1713nte:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1713nte:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-390-0-1-0","id":"15656645","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":391,"dataTestId":"vuln-software-config-391","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-391-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-391-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1714_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1714_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1714_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-391-0-0-0","id":"15656731","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-391-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1714%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1714:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1714:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-391-0-1-0","id":"15656646","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":392,"dataTestId":"vuln-software-config-392","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-392-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-392-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1715ter_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1715ter_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1715ter_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-392-0-0-0","id":"15656732","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-392-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1715ter%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1715ter:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1715ter:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-392-0-1-0","id":"15656647","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":393,"dataTestId":"vuln-software-config-393","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-393-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-393-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1718t_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1718t_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1718t_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-393-0-0-0","id":"15656733","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-393-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1718t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1718t:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1718t:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-393-0-1-0","id":"15656648","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":394,"dataTestId":"vuln-software-config-394","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-394-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-394-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1722ne_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1722ne_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1722ne_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-394-0-0-0","id":"15656734","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-394-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1722ne%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1722ne:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1722ne:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-394-0-1-0","id":"15656649","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":395,"dataTestId":"vuln-software-config-395","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-395-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-395-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1726_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1726_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1726_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-395-0-0-0","id":"15656735","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-395-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1726%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1726:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1726:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-395-0-1-0","id":"15656650","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":396,"dataTestId":"vuln-software-config-396","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-396-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-396-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1732te_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1732te_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1732te_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-396-0-0-0","id":"15656736","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-396-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1732te%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1732te:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1732te:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-396-0-1-0","id":"15656651","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":397,"dataTestId":"vuln-software-config-397","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-397-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-397-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1733nt_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1733nt_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1733nt_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-397-0-0-0","id":"15656737","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-397-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1733nt%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1733nt:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1733nt:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-397-0-1-0","id":"15656652","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":398,"dataTestId":"vuln-software-config-398","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-398-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-398-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1734nt_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1734nt_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1734nt_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-398-0-0-0","id":"15656738","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-398-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1734nt%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1734nt:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1734nt:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-398-0-1-0","id":"15656653","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":399,"dataTestId":"vuln-software-config-399","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-399-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-399-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1735tr_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1735tr_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1735tr_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-399-0-0-0","id":"15656739","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-399-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1735tr%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1735tr:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1735tr:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-399-0-1-0","id":"15656654","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":400,"dataTestId":"vuln-software-config-400","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-400-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-400-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1736_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1736_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1736_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-400-0-0-0","id":"15656740","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-400-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1736%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1736:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1736:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-400-0-1-0","id":"15656655","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":401,"dataTestId":"vuln-software-config-401","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-401-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-401-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1736nt_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1736nt_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1736nt_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-401-0-0-0","id":"15656741","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-401-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1736nt%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1736nt:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1736nt:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-401-0-1-0","id":"15656656","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":402,"dataTestId":"vuln-software-config-402","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-402-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-402-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1739_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1739_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1739_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-402-0-0-0","id":"15656742","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-402-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1739%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1739:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1739:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-402-0-1-0","id":"15656657","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":403,"dataTestId":"vuln-software-config-403","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-403-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-403-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1746ter_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1746ter_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1746ter_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-403-0-0-0","id":"15656743","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-403-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1746ter%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1746ter:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1746ter:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-403-0-1-0","id":"15656658","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":404,"dataTestId":"vuln-software-config-404","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-404-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-404-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1747nte_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1747nte_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1747nte_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-404-0-0-0","id":"15656744","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-404-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1747nte%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1747nte:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1747nte:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-404-0-1-0","id":"15656659","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":405,"dataTestId":"vuln-software-config-405","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-405-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-405-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1748te_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1748te_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1748te_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-405-0-0-0","id":"15656745","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-405-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1748te%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1748te:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1748te:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-405-0-1-0","id":"15656660","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":406,"dataTestId":"vuln-software-config-406","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-406-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-406-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1749nt_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1749nt_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1749nt_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-406-0-0-0","id":"15656440","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-406-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1749nt%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1749nt:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1749nt:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-406-0-1-0","id":"15656568","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":407,"dataTestId":"vuln-software-config-407","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-407-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-407-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-2712t_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-2712t_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-2712t_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-407-0-0-0","id":"15656441","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-407-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-2712t%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-2712t:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-2712t:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-407-0-1-0","id":"15656569","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":408,"dataTestId":"vuln-software-config-408","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-408-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-408-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-2733nt_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-2733nt_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-2733nt_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-408-0-0-0","id":"15656442","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-408-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-2733nt%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-2733nt:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-2733nt:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-408-0-1-0","id":"15656570","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":409,"dataTestId":"vuln-software-config-409","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-409-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-409-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-2738_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-2738_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-2738_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-409-0-0-0","id":"15656443","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-409-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-2738%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-2738:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-2738:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-409-0-1-0","id":"15656571","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":410,"dataTestId":"vuln-software-config-410","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-410-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-410-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-2752nte_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-2752nte_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-2752nte_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-410-0-0-0","id":"15656679","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-410-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-2752nte%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-2752nte:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-2752nte:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-410-0-1-0","id":"15656592","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":411,"dataTestId":"vuln-software-config-411","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-411-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-411-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-2752ter_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-2752ter_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-2752ter_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-411-0-0-0","id":"15656680","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-411-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-2752ter%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-2752ter:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-2752ter:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-411-0-1-0","id":"15656593","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":412,"dataTestId":"vuln-software-config-412","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-412-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-412-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-2753nt_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-2753nt_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-2753nt_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-412-0-0-0","id":"15656706","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-412-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-2753nt%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-2753nt:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-2753nt:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-412-0-1-0","id":"15656621","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":413,"dataTestId":"vuln-software-config-413","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-413-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-413-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-2766nt_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-2766nt_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-2766nt_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-413-0-0-0","id":"15656707","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-413-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-2766nt%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-2766nt:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-2766nt:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-413-0-1-0","id":"15656622","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":414,"dataTestId":"vuln-software-config-414","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-414-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-414-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-2775te_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-2775te_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-2775te_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-414-0-0-0","id":"15656669","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-414-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-2775te%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-2775te:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-2775te:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-414-0-1-0","id":"15656583","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":415,"dataTestId":"vuln-software-config-415","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-415-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-415-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-2776nt_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-2776nt_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-2776nt_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-415-0-0-0","id":"15656670","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-415-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-2776nt%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-2776nt:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-2776nt:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-415-0-1-0","id":"15656584","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":416,"dataTestId":"vuln-software-config-416","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-416-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-416-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-2779_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-2779_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-2779_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-416-0-0-0","id":"15656671","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-416-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-2779%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-2779:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-2779:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-416-0-1-0","id":"15656585","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":417,"dataTestId":"vuln-software-config-417","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-417-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-417-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-2786nte_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-2786nte_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-2786nte_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-417-0-0-0","id":"15656672","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-417-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-2786nte%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-2786nte:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-2786nte:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-417-0-1-0","id":"15656586","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":418,"dataTestId":"vuln-software-config-418","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-418-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-418-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-2795nt_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-2795nt_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-2795nt_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-418-0-0-0","id":"15656673","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-418-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-2795nt%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-2795nt:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-2795nt:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-418-0-1-0","id":"15656587","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":419,"dataTestId":"vuln-software-config-419","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-419-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-419-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-2796nt_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-2796nt_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-2796nt_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-419-0-0-0","id":"15656674","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-419-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-2796nt%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-2796nt:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-2796nt:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-419-0-1-0","id":"15656588","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":420,"dataTestId":"vuln-software-config-420","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-420-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-420-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-2796te_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-2796te_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-2796te_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-420-0-0-0","id":"15656675","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-420-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-2796te%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-2796te:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-2796te:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-420-0-1-0","id":"15656589","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":421,"dataTestId":"vuln-software-config-421","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-421-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-421-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-2798nt_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-2798nt_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-2798nt_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-421-0-0-0","id":"15656676","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-421-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-2798nt%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-2798nt:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-2798nt:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-421-0-1-0","id":"15656590","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":422,"dataTestId":"vuln-software-config-422","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-422-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-422-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-2799_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-2799_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-2799_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-422-0-0-0","id":"15656446","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-422-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-2799%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-2799:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-2799:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-422-0-1-0","id":"15656574","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":423,"dataTestId":"vuln-software-config-423","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-423-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-423-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1602_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1602_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1602_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-423-0-0-0","id":"15656661","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-423-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1602%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1602:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1602:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-423-0-1-0","id":"15656575","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":424,"dataTestId":"vuln-software-config-424","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-424-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-424-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1622_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1622_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1622_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-424-0-0-0","id":"15656662","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-424-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1622%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1622:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1622:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-424-0-1-0","id":"15656576","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":425,"dataTestId":"vuln-software-config-425","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-425-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-425-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1623n_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1623n_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1623n_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-425-0-0-0","id":"15656663","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-425-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1623n%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1623n:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1623n:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-425-0-1-0","id":"15656577","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":426,"dataTestId":"vuln-software-config-426","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-426-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-426-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1627_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1627_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1627_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-426-0-0-0","id":"15656664","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-426-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1627%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1627:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1627:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-426-0-1-0","id":"15656578","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":427,"dataTestId":"vuln-software-config-427","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-427-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-427-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1633n_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1633n_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1633n_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-427-0-0-0","id":"15656665","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-427-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1633n%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1633n:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1633n:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-427-0-1-0","id":"15656579","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":428,"dataTestId":"vuln-software-config-428","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-428-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-428-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1637_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1637_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1637_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-428-0-0-0","id":"15656666","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-428-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1637%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1637:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1637:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-428-0-1-0","id":"15656580","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":429,"dataTestId":"vuln-software-config-429","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-429-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-429-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1649n_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1649n_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1649n_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-429-0-0-0","id":"15656723","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-429-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1649n%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1649n:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1649n:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-429-0-1-0","id":"15656638","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":430,"dataTestId":"vuln-software-config-430","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-430-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-430-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1653n_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1653n_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1653n_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-430-0-0-0","id":"15656724","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-430-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1653n%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1653n:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1653n:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-430-0-1-0","id":"15656639","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":431,"dataTestId":"vuln-software-config-431","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-431-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-431-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-2123it_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-2123it_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-2123it_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-431-0-0-0","id":"15656725","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-431-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-2123it%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-2123it:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-2123it:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-431-0-1-0","id":"15656640","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":432,"dataTestId":"vuln-software-config-432","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-432-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-432-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-2141i_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-2141i_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-2141i_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-432-0-0-0","id":"15656726","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-432-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-2141i%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-2141i:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-2141i:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-432-0-1-0","id":"15656641","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":433,"dataTestId":"vuln-software-config-433","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-433-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-433-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-2142it_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-2142it_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-2142it_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-433-0-0-0","id":"15656727","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-433-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-2142it%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-2142it:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-2142it:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-433-0-1-0","id":"15656642","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":434,"dataTestId":"vuln-software-config-434","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-434-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-434-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-2143it_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-2143it_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-2143it_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-434-0-0-0","id":"15656444","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-434-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-2143it%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-2143it:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-2143it:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-434-0-1-0","id":"15656572","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":435,"dataTestId":"vuln-software-config-435","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-435-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-435-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-2145nt_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-2145nt_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-2145nt_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-435-0-0-0","id":"15656445","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-435-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-2145nt%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-2145nt:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-2145nt:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-435-0-1-0","id":"15656573","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":436,"dataTestId":"vuln-software-config-436","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-436-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-436-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-2146nt_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-2146nt_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-2146nt_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-436-0-0-0","id":"15656682","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-436-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-2146nt%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-2146nt:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-2146nt:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-436-0-1-0","id":"15656595","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":437,"dataTestId":"vuln-software-config-437","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-437-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-437-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-2161i_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-2161i_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-2161i_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-437-0-0-0","id":"15656683","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-437-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-2161i%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-2161i:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-2161i:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-437-0-1-0","id":"15656596","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":438,"dataTestId":"vuln-software-config-438","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-438-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-438-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-2163it_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-2163it_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-2163it_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-438-0-0-0","id":"15656684","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-438-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-2163it%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-2163it:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-2163it:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-438-0-1-0","id":"15656597","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":439,"dataTestId":"vuln-software-config-439","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-439-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-439-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-2166nt_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-2166nt_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-2166nt_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-439-0-0-0","id":"15656685","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-439-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-2166nt%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-2166nt:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-2166nt:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-439-0-1-0","id":"15656598","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":440,"dataTestId":"vuln-software-config-440","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-440-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-440-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-2173it_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-2173it_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-2173it_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-440-0-0-0","id":"15656422","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-440-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-2173it%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-2173it:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-2173it:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-440-0-1-0","id":"15656550","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":441,"dataTestId":"vuln-software-config-441","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-441-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-441-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-2177nt_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-2177nt_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-2177nt_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-441-0-0-0","id":"15656423","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-441-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-2177nt%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-2177nt:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-2177nt:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-441-0-1-0","id":"15656551","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":442,"dataTestId":"vuln-software-config-442","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-442-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-442-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-2183it_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-2183it_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-2183it_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-442-0-0-0","id":"15656424","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-442-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-2183it%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-2183it:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-2183it:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-442-0-1-0","id":"15656552","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":443,"dataTestId":"vuln-software-config-443","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-443-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-443-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-2187nt_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-2187nt_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-2187nt_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-443-0-0-0","id":"15656425","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-443-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-2187nt%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-2187nt:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-2187nt:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-443-0-1-0","id":"15656553","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":444,"dataTestId":"vuln-software-config-444","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-444-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-444-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1513n_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1513n_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1513n_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-444-0-0-0","id":"15656426","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-444-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1513n%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1513n:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1513n:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-444-0-1-0","id":"15656554","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":445,"dataTestId":"vuln-software-config-445","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-445-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-445-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1523n_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1523n_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1523n_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-445-0-0-0","id":"15656427","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-445-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1523n%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1523n:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1523n:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-445-0-1-0","id":"15656555","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":446,"dataTestId":"vuln-software-config-446","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-446-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-446-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1533n_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1533n_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1533n_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-446-0-0-0","id":"15656428","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-446-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1533n%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1533n:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1533n:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-446-0-1-0","id":"15656556","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":447,"dataTestId":"vuln-software-config-447","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-447-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-447-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1543n_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1543n_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1543n_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-447-0-0-0","id":"15656429","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-447-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1543n%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1543n:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1543n:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-447-0-1-0","id":"15656557","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":448,"dataTestId":"vuln-software-config-448","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-448-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-448-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1553n_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1553n_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1553n_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-448-0-0-0","id":"15656430","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-448-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1553n%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1553n:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1553n:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-448-0-1-0","id":"15656558","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":449,"dataTestId":"vuln-software-config-449","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-449-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-449-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1529_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1529_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1529_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-449-0-0-0","id":"15656431","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-449-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1529%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1529:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1529:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-449-0-1-0","id":"15656559","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":450,"dataTestId":"vuln-software-config-450","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-450-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-450-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1539_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1539_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1539_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-450-0-0-0","id":"15656432","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-450-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1539%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1539:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1539:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-450-0-1-0","id":"15656560","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":451,"dataTestId":"vuln-software-config-451","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-451-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-451-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1559_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1559_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1559_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-451-0-0-0","id":"15656433","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-451-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1559%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1559:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1559:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-451-0-1-0","id":"15656561","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":452,"dataTestId":"vuln-software-config-452","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-452-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-452-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1557_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1557_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1557_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-452-0-0-0","id":"15656434","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-452-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1557%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1557:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1557:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-452-0-1-0","id":"15656562","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":453,"dataTestId":"vuln-software-config-453","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-453-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-453-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1567_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1567_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1567_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-453-0-0-0","id":"15656435","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-453-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1567%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1567:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1567:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-453-0-1-0","id":"15656563","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":454,"dataTestId":"vuln-software-config-454","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-454-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-454-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1571_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1571_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1571_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-454-0-0-0","id":"15656436","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-454-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1571%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1571:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1571:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-454-0-1-0","id":"15656564","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":455,"dataTestId":"vuln-software-config-455","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-455-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-455-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1577_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1577_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1577_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-455-0-0-0","id":"15656437","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-455-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1577%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1577:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1577:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-455-0-1-0","id":"15656565","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":456,"dataTestId":"vuln-software-config-456","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-456-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-456-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1518_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1518_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1518_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-456-0-0-0","id":"15656438","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-456-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1518%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1518:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1518:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-456-0-1-0","id":"15656566","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":457,"dataTestId":"vuln-software-config-457","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-457-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-457-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1521_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1521_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1521_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-457-0-0-0","id":"15656439","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-457-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1521%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1521:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1521:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-457-0-1-0","id":"15656567","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":458,"dataTestId":"vuln-software-config-458","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-458-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-458-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1527_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1527_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1527_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-458-0-0-0","id":"15656693","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-458-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1527%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1527:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1527:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-458-0-1-0","id":"15656607","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":459,"dataTestId":"vuln-software-config-459","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-459-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-459-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1528_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1528_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1528_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-459-0-0-0","id":"15656694","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-459-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1528%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1528:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1528:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-459-0-1-0","id":"15656608","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":460,"dataTestId":"vuln-software-config-460","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-460-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-460-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1531_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1531_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1531_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-460-0-0-0","id":"15656602","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-460-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1531%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1531:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1531:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-460-0-1-0","id":"15656689","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":461,"dataTestId":"vuln-software-config-461","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-461-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-461-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1537_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1537_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1537_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-461-0-0-0","id":"15656603","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-461-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1537%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1537:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1537:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-461-0-1-0","id":"15656690","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":462,"dataTestId":"vuln-software-config-462","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-462-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-462-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1541_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1541_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1541_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-462-0-0-0","id":"15656604","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-462-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1541%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1541:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1541:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-462-0-1-0","id":"15656691","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":463,"dataTestId":"vuln-software-config-463","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-463-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-463-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1548_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1548_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1548_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-463-0-0-0","id":"15656605","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-463-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1548%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1548:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1548:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-463-0-1-0","id":"15656692","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":464,"dataTestId":"vuln-software-config-464","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-464-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-464-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1520_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1520_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1520_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-464-0-0-0","id":"15656606","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-464-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1520%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1520:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1520:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-464-0-1-0","id":"15656677","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":465,"dataTestId":"vuln-software-config-465","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-465-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-465-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_d-1540_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_d-1540_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_d-1540_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-465-0-0-0","id":"15656591","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-465-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_d-1540%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_d-1540:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_d-1540:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-465-0-1-0","id":"15656678","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":466,"dataTestId":"vuln-software-config-466","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-466-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-466-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_platinum_p-8136_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_platinum_p-8136_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_platinum_p-8136_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-466-0-0-0","id":"15656667","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-466-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_platinum_p-8136%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_platinum_p-8136:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_platinum_p-8136:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-466-0-1-0","id":"15656581","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]},{"id":467,"dataTestId":"vuln-software-config-467","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-467-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-467-0-0","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aintel%3Axeon_platinum_p-8124_firmware%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:intel:xeon_platinum_p-8124_firmware:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:intel:xeon_platinum_p-8124_firmware:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-467-0-0-0","id":"15656668","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-467-0-1","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Aintel%3Axeon_platinum_p-8124%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:intel:xeon_platinum_p-8124:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:intel:xeon_platinum_p-8124:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-467-0-1-0","id":"15656582","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]}]"/>
|
||
|
||
<p id="vulnCpeInfo" >
|
||
<small>
|
||
<i class="fa fa-bug fa-flip-vertical"></i> Denotes Vulnerable Software<br />
|
||
<a href="mailto:cpe_dictionary@nist.gov">Are we missing a CPE here? Please let us know</a>.<br />
|
||
|
||
</small>
|
||
</p>
|
||
<script src="/site-media/js/vulnerability/cpe-match.js"
|
||
type="text/javascript"></script>
|
||
<script src="/site-media/js/vulnerability/configurationListing.js"
|
||
type="text/javascript"></script>
|
||
</div>
|
||
</div>
|
||
|
||
<div id="vulnChangeHistoryDiv"
|
||
data-testid="vuln-change-history-container">
|
||
<h3 id="VulnChangeHistorySection">Change History</h3>
|
||
<small> 5 change records found <a href="#VulnChangeHistorySection"
|
||
style="text-decoration: underline" id="changeHistoryToggle">show
|
||
changes</a>
|
||
</small>
|
||
<div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-0">CVE Modified by CVE</span> <span
|
||
data-testid="vuln-change-history-date-0">11/21/2024 2:15:45 AM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">Reference</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">https://security.netapp.com/advisory/ntap-20231124-0006/</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">Reference</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00807.html</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-1">CVE Modified by Intel Corporation</span> <span
|
||
data-testid="vuln-change-history-date-1">5/14/2024 7:14:35 AM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-2">CVE Modified by Intel Corporation</span> <span
|
||
data-testid="vuln-change-history-date-2">11/24/2023 4:15:07 AM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">Reference</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">Intel Corporation https://security.netapp.com/advisory/ntap-20231124-0006/ [No types assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-3">CVE Modified by Intel Corporation</span> <span
|
||
data-testid="vuln-change-history-date-3">11/06/2023 10:50:01 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-3">
|
||
<td
|
||
data-testid="vuln-change-history-3-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-3-type">CWE</td>
|
||
<td data-testid="vuln-change-history-3-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-3-new">
|
||
|
||
<pre style="word-break: break-all !important">Intel Corporation CWE-668</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-4">Initial Analysis by NIST</span> <span
|
||
data-testid="vuln-change-history-date-4">5/18/2023 6:54:52 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CVSS V3.1</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">NIST AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CWE</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">NIST CWE-668</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i3-1000g1_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i3-1000g1:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i3-1000g4_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i3-1000g4:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i3-1005g1_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i3-1005g1:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i3-10100_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i3-10100:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i3-10100e_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i3-10100e:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i3-10100f_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i3-10100f:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i3-10100t_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i3-10100t:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i3-10100te_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i3-10100te:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i3-10100y_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i3-10100y:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i3-10105_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i3-10105:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i3-10105f_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i3-10105f:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i3-10105t_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i3-10105t:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i3-10110u_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i3-10110u:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i3-10110y_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i3-10110y:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i3-10300_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i3-10300:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i3-10300t_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i3-10300t:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i3-10305_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i3-10305:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i3-10305t_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i3-10305t:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i3-10320_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i3-10320:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i3-10325_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i3-10325:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i3-7020u_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i3-7020u:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i3-7100_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i3-7100:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i3-7100e_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i3-7100e:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i3-7100h_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i3-7100h:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i3-7100t_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i3-7100t:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i3-7100u_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i3-7100u:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i3-7101e_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i3-7101e:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i3-7101te_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i3-7101te:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i3-7102e_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i3-7102e:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i3-7130u_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i3-7130u:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i3-7167u_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i3-7167u:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i3-7300_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i3-7300:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i3-7300t_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i3-7300t:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i3-7320_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i3-7320:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i3-7350k_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i3-7350k:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i3-8100_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i3-8100:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i3-8100b_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i3-8100b:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i3-8100h_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i3-8100h:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i3-8100t_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i3-8100t:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i3-8109u_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i3-8109u:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i3-8130u_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i3-8130u:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i3-8140u_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i3-8140u:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i3-8145u_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i3-8145u:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i3-8145ue_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i3-8145ue:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i3-8300_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i3-8300:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i3-8300t_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i3-8300t:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i3-8350k_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i3-8350k:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i3-9100_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i3-9100:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i3-9100e_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i3-9100e:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i3-9100f_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i3-9100f:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i3-9100hl_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i3-9100hl:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i3-9100t_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i3-9100t:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i3-9100te_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i3-9100te:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i3-9300_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i3-9300:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i3-9300t_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i3-9300t:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i3-9320_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i3-9320:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i3-9350k_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i3-9350k:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i3-9350kf_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i3-9350kf:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i5-10200h_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i5-10200h:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i5-10210u_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i5-10210u:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i5-10210y_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i5-10210y:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i5-10300h_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i5-10300h:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i5-1030g4_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i5-1030g4:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i5-1030g7_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i5-1030g7:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i5-10310u_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i5-10310u:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i5-10310y_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i5-10310y:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i5-1035g1_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i5-1035g1:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i5-1035g4_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i5-1035g4:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i5-1035g7_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i5-1035g7:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i5-1038ng7_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i5-1038ng7:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i5-10400_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i5-10400:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i5-10400f_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i5-10400f:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i5-10400h_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i5-10400h:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i5-10400t_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i5-10400t:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i5-10500_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i5-10500:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i5-10500e_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i5-10500e:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i5-10500h_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i5-10500h:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i5-10500t_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i5-10500t:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i5-10500te_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i5-10500te:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i5-10505_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i5-10505:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i5-10600_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i5-10600:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i5-10600k_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i5-10600k:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i5-10600kf_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i5-10600kf:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i5-10600t_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i5-10600t:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i5-7200u_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i5-7200u:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i5-7260u_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i5-7260u:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i5-7267u_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i5-7267u:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i5-7287u_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i5-7287u:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i5-7300hq_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i5-7300hq:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i5-7300u_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i5-7300u:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i5-7360u_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i5-7360u:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i5-7400_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i5-7400:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i5-7400t_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i5-7400t:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i5-7440eq_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i5-7440eq:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i5-7440hq_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i5-7440hq:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i5-7442eq_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i5-7442eq:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i5-7500_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i5-7500:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i5-7500t_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i5-7500t:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i5-7600_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i5-7600:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i5-7600k_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i5-7600k:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i5-7600t_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i5-7600t:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i5-7y54_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i5-7y54:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i5-7y57_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i5-7y57:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i5-8200y_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i5-8200y:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i5-8210y_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i5-8210y:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i5-8250u_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i5-8250u:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i5-8257u_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i5-8257u:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i5-8259u_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i5-8259u:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i5-8260u_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i5-8260u:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i5-8265u_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i5-8265u:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i5-8269u_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i5-8269u:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i5-8279u_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i5-8279u:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i5-8300h_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i5-8300h:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i5-8305g_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i5-8305g:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i5-8310y_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i5-8310y:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i5-8350u_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i5-8350u:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i5-8365u_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i5-8365u:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i5-8365ue_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i5-8365ue:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i5-8400_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i5-8400:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i5-8400b_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i5-8400b:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i5-8400h_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i5-8400h:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i5-8400t_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i5-8400t:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i5-8500_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i5-8500:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i5-8500b_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i5-8500b:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i5-8500t_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i5-8500t:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i5-8600_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i5-8600:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i5-8600k_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i5-8600k:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i5-8600t_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i5-8600t:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i5-9300h_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i5-9300h:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i5-9300hf_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i5-9300hf:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i5-9400_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i5-9400:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i5-9400f_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i5-9400f:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i5-9400h_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i5-9400h:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i5-9400t_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i5-9400t:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i5-9500_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i5-9500:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i5-9500e_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i5-9500e:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i5-9500f_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i5-9500f:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i5-9500t_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i5-9500t:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i5-9500te_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i5-9500te:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i5-9600_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i5-9600:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i5-9600k_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i5-9600k:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i5-9600kf_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i5-9600kf:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i5-9600t_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i5-9600t:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i7-10510u_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i7-10510u:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i7-10510y_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i7-10510y:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i7-1060g7_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i7-1060g7:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i7-10610u_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i7-10610u:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i7-1065g7_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i7-1065g7:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i7-1068ng7_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i7-1068ng7:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i7-10700_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i7-10700:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i7-10700e_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i7-10700e:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i7-10700f_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i7-10700f:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i7-10700k_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i7-10700k:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i7-10700kf_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i7-10700kf:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i7-10700t_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i7-10700t:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i7-10700te_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i7-10700te:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i7-10710u_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i7-10710u:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i7-10750h_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i7-10750h:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i7-10810u_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i7-10810u:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i7-10850h_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i7-10850h:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i7-10870h_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i7-10870h:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i7-10875h_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i7-10875h:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i7-7500u_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i7-7500u:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i7-7560u_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i7-7560u:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i7-7567u_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i7-7567u:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i7-7600u_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i7-7600u:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i7-7660u_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i7-7660u:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i7-7700_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i7-7700:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i7-7700hq_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i7-7700hq:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i7-7700k_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i7-7700k:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i7-7700t_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i7-7700t:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i7-7820eq_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i7-7820eq:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i7-7820hk_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i7-7820hk:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i7-7820hq_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i7-7820hq:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i7-7920hq_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i7-7920hq:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i7-7y75_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i7-7y75:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i7-8086k_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i7-8086k:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i7-8500y_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i7-8500y:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i7-8550u_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i7-8550u:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i7-8557u_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i7-8557u:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i7-8559u_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i7-8559u:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i7-8565u_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i7-8565u:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i7-8569u_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i7-8569u:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i7-8650u_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i7-8650u:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i7-8665u_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i7-8665u:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i7-8665ue_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i7-8665ue:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i7-8700_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i7-8700:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i7-8700b_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i7-8700b:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i7-8700k_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i7-8700k:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i7-8700t_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i7-8700t:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i7-8705g_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i7-8705g:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i7-8706g_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i7-8709g_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i7-8709g:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i7-8750h_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i7-8750h:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i7-8809g_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i7-8809g:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i7-8850h_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i7-8850h:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i7-9700_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i7-9700:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i7-9700e_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i7-9700e:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i7-9700f_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i7-9700f:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i7-9700k_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i7-9700k:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i7-9700kf_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i7-9700kf:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i7-9700t_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i7-9700t:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i7-9700te_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i7-9700te:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i7-9750h_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i7-9750h:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i7-9750hf_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i7-9750hf:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i7-9850h_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i7-9850h:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i7-9850he_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i7-9850he:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i7-9850hl_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i7-9850hl:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i7\+8700_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i7\+8700:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i9-10850k_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i9-10850k:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i9-10885h_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i9-10885h:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i9-10900_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i9-10900:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i9-10900e_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i9-10900e:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i9-10900f_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i9-10900f:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i9-10900k_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i9-10900k:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i9-10900kf_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i9-10900kf:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i9-10900t_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i9-10900t:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i9-10900te_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i9-10900te:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i9-10980hk_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i9-10980hk:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i9-8950hk_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i9-8950hk:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i9-9880h_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i9-9880h:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i9-9900_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i9-9900:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i9-9900k_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i9-9900k:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i9-9900kf_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i9-9900kf:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i9-9900ks_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i9-9900ks:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i9-9900t_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i9-9900t:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_i9-9980hk_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_i9-9980hk:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_m3-7y30_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_m3-7y30:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_m3-7y32_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_m3-7y32:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:core_m3-8100y_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:core_m3-8100y:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_bronze_3104_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_bronze_3104:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_bronze_3106_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_bronze_3106:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1513n_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1513n:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1518_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1518:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1520_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1520:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1521_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1521:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1523n_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1523n:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1527_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1527:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1528_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1528:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1529_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1529:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1531_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1531:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1533n_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1533n:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1537_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1537:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1539_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1539:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1540_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1540:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1541_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1541:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1543n_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1543n:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1548_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1548:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1553n_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1553n:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1557_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1557:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1559_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1559:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1567_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1567:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1571_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1571:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1577_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1577:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1602_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1602:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1622_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1622:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1623n_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1623n:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1627_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1627:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1633n_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1633n:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1637_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1637:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1649n_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1649n:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1653n_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1653n:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1702_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1702:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1712tr_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1712tr:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1713nt_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1713nt:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1713nte_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1713nte:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1714_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1714:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1715ter_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1715ter:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1718t_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1718t:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1722ne_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1722ne:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1726_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1726:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1732te_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1732te:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1733nt_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1733nt:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1734nt_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1734nt:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1735tr_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1735tr:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1736_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1736:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1736nt_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1736nt:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1739_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1739:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1746ter_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1746ter:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1747nte_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1747nte:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1748te_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1748te:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-1749nt_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-1749nt:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-2123it_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-2123it:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-2141i_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-2141i:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-2142it_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-2142it:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-2143it_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-2143it:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-2145nt_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-2145nt:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-2146nt_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-2146nt:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-2161i_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-2161i:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-2163it_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-2163it:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-2166nt_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-2166nt:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-2173it_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-2173it:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-2177nt_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-2177nt:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-2183it_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-2183it:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-2187nt_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-2187nt:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-2712t_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-2712t:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-2733nt_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-2733nt:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-2738_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-2738:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-2752nte_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-2752nte:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-2752ter_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-2752ter:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-2753nt_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-2753nt:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-2766nt_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-2766nt:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-2775te_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-2775te:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-2776nt_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-2776nt:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-2779_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-2779:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-2786nte_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-2786nte:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-2795nt_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-2795nt:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-2796nt_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-2796nt:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-2796te_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-2796te:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-2798nt_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-2798nt:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_d-2799_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_d-2799:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e-2124_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e-2124:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e-2124g_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e-2124g:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e-2126g_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e-2126g:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e-2134_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e-2134:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e-2136_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e-2136:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e-2144g_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e-2144g:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e-2146g_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e-2146g:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e-2174g_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e-2174g:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e-2176g_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e-2176g:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e-2176m_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e-2176m:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e-2186g_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e-2186g:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e-2186m_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e-2186m:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e-2224_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e-2224:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e-2224g_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e-2224g:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e-2226g_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e-2226g:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e-2226ge_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e-2226ge:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e-2234_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e-2234:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e-2236_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e-2236:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e-2244g_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e-2244g:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e-2246g_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e-2246g:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e-2254me_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e-2254me:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e-2254ml_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e-2254ml:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e-2274g_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e-2274g:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e-2276g_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e-2276g:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e-2276m_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e-2276m:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e-2276me_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e-2276me:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e-2276ml_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e-2276ml:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e-2278g_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e-2278g:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e-2278ge_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e-2278ge:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e-2278gel_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e-2278gel:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e-2286g_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e-2286g:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e-2286m_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e-2286m:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e-2288g_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e-2288g:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e-2314_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e-2314:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e-2324g_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e-2324g:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e-2334_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e-2334:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e-2336_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e-2336:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e-2356g_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e-2356g:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e-2374g_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e-2374g:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e-2378_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e-2378:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e-2378g_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e-2378g:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e-2386g_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e-2386g:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_e-2388g_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_e-2388g:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_gold_5115_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_gold_5115:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_gold_5118_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_gold_5118:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_gold_5119t_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_gold_5119t:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_gold_5120_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_gold_5120:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_gold_5120t_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_gold_5120t:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_gold_5122_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_gold_5122:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_gold_6126_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_gold_6126:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_gold_6126f_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_gold_6126f:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_gold_6126t_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_gold_6126t:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_gold_6128_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_gold_6128:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_gold_6130_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_gold_6130:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_gold_6130f_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_gold_6130f:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_gold_6130t_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_gold_6130t:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_gold_6132_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_gold_6132:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_gold_6134_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_gold_6134:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_gold_6136_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_gold_6136:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_gold_6138_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_gold_6138:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_gold_6138f_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_gold_6138f:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_gold_6138p_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_gold_6138p:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_gold_6138t_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_gold_6138t:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_gold_6140_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_gold_6140:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_gold_6142_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_gold_6142:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_gold_6142f_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_gold_6142f:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_gold_6144_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_gold_6144:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_gold_6146_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_gold_6146:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_gold_6148_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_gold_6148:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_gold_6148f_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_gold_6148f:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_gold_6150_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_gold_6150:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_gold_6152_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_gold_6152:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_gold_6154_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_gold_6154:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_platinum_8153_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_platinum_8153:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_platinum_8156_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_platinum_8156:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_platinum_8158_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_platinum_8158:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_platinum_8160_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_platinum_8160:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_platinum_8160f_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_platinum_8160f:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_platinum_8160t_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_platinum_8160t:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_platinum_8164_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_platinum_8164:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_platinum_8168_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_platinum_8168:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_platinum_8170_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_platinum_8170:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_platinum_8176_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_platinum_8176:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_platinum_8176f_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_platinum_8176f:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_platinum_8180_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_platinum_8180:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_platinum_p-8124_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_platinum_p-8124:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_platinum_p-8136_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_platinum_p-8136:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_silver_4108_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_silver_4108:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_silver_4109t_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_silver_4109t:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_silver_4110_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_silver_4110:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_silver_4112_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_silver_4112:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_silver_4114_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_silver_4114:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_silver_4114t_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_silver_4114t:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_silver_4116_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_silver_4116:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_silver_4116t_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_silver_4116t:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_w-10855m_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_w-10855m:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_w-10885m_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_w-10885m:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_w-11155mle_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_w-11155mle:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_w-11155mre_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_w-11155mre:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_w-11555mle_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_w-11555mle:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_w-11555mre_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_w-11555mre:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_w-11855m_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_w-11855m:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_w-11865mle_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_w-11865mle:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_w-11865mre_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_w-11865mre:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_w-11955m_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_w-11955m:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_w-1250_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_w-1250:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_w-1250e_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_w-1250e:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_w-1250p_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_w-1250p:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_w-1250te_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_w-1250te:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_w-1270_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_w-1270:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_w-1270e_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_w-1270e:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_w-1270p_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_w-1270p:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_w-1270te_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_w-1270te:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_w-1290_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_w-1290:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_w-1290e_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_w-1290e:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_w-1290p_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_w-1290p:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_w-1290t_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_w-1290t:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_w-1290te_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_w-1290te:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_w-1350_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_w-1350:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_w-1350p_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_w-1350p:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_w-1370_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_w-1370:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_w-1370p_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_w-1370p:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_w-1390_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_w-1390:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_w-1390p_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_w-1390p:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_w-1390t_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_w-1390t:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_w-2123_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_w-2123:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_w-2125_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_w-2125:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_w-2133_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_w-2133:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_w-2135_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_w-2135:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_w-2145_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_w-2145:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_w-2155_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_w-2155:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_w-2175_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_w-2175:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_w-2195_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_w-2195:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_w-2223_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_w-2223:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_w-2225_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_w-2225:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_w-2235_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_w-2235:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_w-2245_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_w-2245:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_w-2255_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_w-2255:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_w-2265_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_w-2265:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_w-2275_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_w-2275:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_w-2295_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_w-2295:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_w-3175x_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_w-3175x:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_w-3223_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_w-3223:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_w-3225_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_w-3225:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_w-3235_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_w-3235:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_w-3245_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_w-3245:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_w-3245m_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_w-3245m:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_w-3265_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_w-3265:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_w-3265m_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_w-3265m:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_w-3275_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_w-3275:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_w-3275m_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_w-3275m:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_w-3323_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_w-3323:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_w-3335_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_w-3335:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_w-3345_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_w-3345:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_w-3365_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_w-3365:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:intel:xeon_w-3375_firmware:-:*:*:*:*:*:*:*
|
||
OR
|
||
cpe:2.3:h:intel:xeon_w-3375:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00807.html No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00807.html Vendor Advisory</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
</div>
|
||
|
||
</div>
|
||
|
||
</div>
|
||
</div>
|
||
|
||
|
||
<div class="col-lg-3 col-md-5 col-sm-12">
|
||
|
||
<div class="bs-callout bs-callout-info">
|
||
<h4>Quick Info</h4>
|
||
<strong>CVE Dictionary Entry:</strong><br/> <a
|
||
target="_blank" rel="noopener noreferrer" data-testid="vuln-cve-dictionary-entry"
|
||
href="https://cve.org/CVERecord?id=CVE-2022-38087">CVE-2022-38087</a><br/> <strong>NVD
|
||
Published Date:</strong><br/> <span
|
||
data-testid="vuln-published-on">05/10/2023</span><br/> <strong>NVD
|
||
Last Modified:</strong><br/> <span
|
||
data-testid="vuln-last-modified-on">11/21/2024</span><br/> <strong>
|
||
Source:</strong><br/> <span
|
||
data-testid="vuln-current-description-source">Intel Corporation</span><br/>
|
||
</div>
|
||
|
||
</div>
|
||
|
||
</div>
|
||
|
||
</td>
|
||
</tr>
|
||
</table>
|
||
|
||
</div>
|
||
<!-- Hidden input for padding -->
|
||
<input type="hidden" value="QilIhSxKk8fMqiQxbLzORWCpoLdIWJQrgwRN75Dv1b0FZuAYcKKT2uU3cbY2raNIUqrlS30JvD8kNy8b4ih8YWYfpOBY3NEsxVCLLt86ibcM9ghZdTvMLnY3SPa3V5a5YgONXgEt49cZM5lFGrTwENSPLBfIqQatjs2POSjXKShD373OH42jjFHfpHD4hArZw86BKOjhTQO8goFMqLUiNEijn54LlYl49RA5JN6GB1GtMpJ32ZRA1jOdWD48hWwa689V2W2URRqoulyJU9HkTcwXsw8WYTnosEimHL3hxLOMKXOTVh2tDwvrhUywrC5bHCB1YsoZB0Gh3lErg4888b7z7l0ZbxGXBijubwcUm9sxZpbVd" id="padding" name="padding"/>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
</main>
|
||
<footer id="footer" role="contentinfo">
|
||
<div class="container">
|
||
|
||
<div class="row">
|
||
<div class="col-sm-12">
|
||
<ul class="social-list pull-right">
|
||
<li class="field-item service-twitter list-horiz"><a
|
||
href="https://twitter.com/NISTCyber" target="_blank" rel="noopener noreferrer"
|
||
class="social-btn social-btn--large extlink ext"> <i
|
||
class="fa fa-twitter fa-fw"><span class="element-invisible">twitter</span></i><span
|
||
class="ext"><span class="element-invisible"> (link
|
||
is external)</span></span>
|
||
</a></li>
|
||
<li class="field-item service-facebook list-horiz"><a
|
||
href="https://www.facebook.com/NIST" target="_blank" rel="noopener noreferrer"
|
||
class="social-btn social-btn--large extlink ext"> <i
|
||
class="fa fa-facebook fa-fw"><span class="element-invisible">facebook</span></i><span
|
||
class="ext"><span class="element-invisible"> (link
|
||
is external)</span></span></a></li>
|
||
<li class="field-item service-linkedin list-horiz"><a
|
||
href="https://www.linkedin.com/company/nist" target="_blank" rel="noopener noreferrer"
|
||
class="social-btn social-btn--large extlink ext"> <i
|
||
class="fa fa-linkedin fa-fw"><span class="element-invisible">linkedin</span></i><span
|
||
class="ext"><span class="element-invisible"> (link
|
||
is external)</span></span></a></li>
|
||
<li class="field-item service-youtube list-horiz"><a
|
||
href="https://www.youtube.com/user/USNISTGOV" target="_blank" rel="noopener noreferrer"
|
||
class="social-btn social-btn--large extlink ext"> <i
|
||
class="fa fa-youtube fa-fw"><span class="element-invisible">youtube</span></i><span
|
||
class="ext"><span class="element-invisible"> (link
|
||
is external)</span></span></a></li>
|
||
<li class="field-item service-rss list-horiz"><a
|
||
href="https://www.nist.gov/news-events/nist-rss-feeds"
|
||
target="_blank" rel="noopener noreferrer" class="social-btn social-btn--large extlink">
|
||
<i class="fa fa-rss fa-fw"><span class="element-invisible">rss</span></i>
|
||
</a></li>
|
||
<li class="field-item service-govdelivery list-horiz last"><a
|
||
href="https://public.govdelivery.com/accounts/USNIST/subscriber/new?qsp=USNIST_3"
|
||
target="_blank" rel="noopener noreferrer" class="social-btn social-btn--large extlink ext">
|
||
<i class="fa fa-envelope fa-fw"><span
|
||
class="element-invisible">govdelivery</span></i><span class="ext"><span
|
||
class="element-invisible"> (link is external)</span></span>
|
||
</a></li>
|
||
</ul>
|
||
<span class="hidden-xs"> <a
|
||
title="National Institute of Standards and Technology" rel="home"
|
||
class="footer-nist-logo"> <img
|
||
src="/site-media/images/nist/nist-logo.png"
|
||
alt="National Institute of Standards and Technology logo" />
|
||
</a>
|
||
</span>
|
||
</div>
|
||
</div>
|
||
<div class="row hidden-sm hidden-md hidden-lg">
|
||
<div class="col-sm-12">
|
||
<a href="https://www.nist.gov"
|
||
title="National Institute of Standards and Technology" rel="home"
|
||
target="_blank" rel="noopener noreferrer" class="footer-nist-logo"> <img
|
||
src="/site-media/images/nist/nist-logo.png"
|
||
alt="National Institute of Standards and Technology logo" />
|
||
</a>
|
||
</div>
|
||
</div>
|
||
|
||
<div class="row footer-contact-container">
|
||
<div class="col-sm-6">
|
||
<strong>HEADQUARTERS</strong>
|
||
<br>
|
||
100 Bureau Drive
|
||
<br>
|
||
Gaithersburg, MD 20899
|
||
<br>
|
||
<a href="tel:301-975-2000">(301) 975-2000</a>
|
||
<br>
|
||
<br>
|
||
<a href="mailto:nvd@nist.gov">Webmaster</a> | <a
|
||
href="https://www.nist.gov/about-nist/contact-us">Contact Us</a>
|
||
| <a href="https://www.nist.gov/about-nist/visit"
|
||
style="display: inline-block;">Our Other Offices</a>
|
||
</div>
|
||
<div class="col-sm-6">
|
||
<div class="pull-right"
|
||
style="text-align:right">
|
||
<strong>Incident Response Assistance and Non-NVD Related<br>Technical Cyber Security Questions:</strong>
|
||
<br>
|
||
US-CERT Security Operations Center
|
||
<br> Email: <a href="mailto:soc@us-cert.gov">soc@us-cert.gov</a>
|
||
<br> Phone: 1-888-282-0870
|
||
</div>
|
||
</div>
|
||
</div>
|
||
|
||
<div class="row">
|
||
<nav title="Footer Navigation" role="navigation"
|
||
class="row footer-bottom-links-container">
|
||
<!-- https://github.com/usnistgov/nist-header-footer/blob/nist-pages/boilerplate-footer.html -->
|
||
<p>
|
||
<a href="https://www.nist.gov/oism/site-privacy">Site Privacy</a>
|
||
|
|
||
<a href="https://www.nist.gov/oism/accessibility">Accessibility</a>
|
||
|
|
||
<a href="https://www.nist.gov/privacy">Privacy Program</a>
|
||
|
|
||
<a href="https://www.nist.gov/oism/copyrights">Copyrights</a>
|
||
|
|
||
<a href="https://www.commerce.gov/vulnerability-disclosure-policy">Vulnerability Disclosure</a>
|
||
|
|
||
<a href="https://www.nist.gov/no-fear-act-policy">No Fear Act Policy</a>
|
||
|
|
||
<a href="https://www.nist.gov/foia">FOIA</a>
|
||
|
|
||
<a href="https://www.nist.gov/environmental-policy-statement">Environmental Policy</a>
|
||
|
|
||
<a href="https://www.nist.gov/summary-report-scientific-integrity">Scientific Integrity</a>
|
||
|
|
||
<a href="https://www.nist.gov/nist-information-quality-standards">Information Quality Standards</a>
|
||
|
|
||
<a href="https://www.commerce.gov/">Commerce.gov</a>
|
||
|
|
||
<a href="https://www.science.gov/">Science.gov</a>
|
||
|
|
||
<a href="https://www.usa.gov/">USA.gov</a>
|
||
</p>
|
||
</nav>
|
||
</div>
|
||
</div>
|
||
</footer>
|
||
</body>
|
||
</html>
|
||
|
||
|