ID

VAR-200609-1252


CVE

CVE-2006-4339


TITLE

OpenSSL SSLv2 client code fails to properly check for NULL

Trust: 0.8

sources: CERT/CC: VU#386964

DESCRIPTION

OpenSSL before 0.9.7, 0.9.7 before 0.9.7k, and 0.9.8 before 0.9.8c, when using an RSA key with exponent 3, removes PKCS-1 padding before generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents OpenSSL from correctly verifying X.509 and other certificates that use PKCS #1. The Oracle SYS.DBMS_AQ package is vulnerable to PL/SQL injection. This vulnerability may allow a remote, authenticated attacker to execute arbitrary PL/SQL commands on a vulnerable Oracle installation. RSA The signature is used to prove that the message origin can be trusted. RSA There is a vulnerability in multiple software that implements that the signature is not verified correctly. For example, SSH , SSL , PGP , X.509 May affect the software.By a remote third party RSA The signature may be forged. This may prevent the validity of the signed message. Hitachi Web Server accepts an SSL certificate sent by a clinet trying to connect to the Server even if the certificate is fraudulent. The vulnerability does not affect the product if the SSL authenticaton client feature is disabled.An attacker could gain access with a fraudulent certificate. Adobe Reader fails to properly handle RSA signatures. Adobe Reader contains an issue where it may fail to properly verify RSA signatures. Masahiko Takenaka of FUJITSU LABORATORIES LTD. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.An attacker may be able to forge an RSA signature on a PDF document. This vulnerability may allow an attacker to forge RSA signatures. Oracle has released a Critical Patch Update advisory for January 2007 to address these vulnerabilities for supported releases. Earlier unsupported releases are likely to be affected by these issues as well. The issues identified by the vendor affect all security properties of the Oracle products and present local and remote threats. Various levels of authorization are needed to leverage some of the issues, but other issues do not require any authorization. The most severe of the vulnerabilities could possibly expose affected computers to complete compromise. An attacker may exploit this issue to sign digital certificates or RSA keys and take advantage of trust relationships that depend on these credentials, possibly posing as a trusted party and signing a certificate or key. All versions prior to and including OpenSSL 0.9.7j and 0.9.8b are affected by this vulnerability. Updates are available. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 - ------------------------------------------------------------------- VMware Security Advisory Advisory ID: VMSA-2007-0001 Synopsis: VMware ESX server security updates Issue date: 2007-01-08 Updated on: 2007-01-08 CVE: CVE-2006-3589 CVE-2006-2937 CVE-2006-2940 CVE-2006-3738 CVE-2006-4339 CVE-2006-4343 CVE-2006-4980 - ------------------------------------------------------------------- 1. Summary: Updated ESX Patches address several security issues. 2. Relevant releases: VMware ESX 3.0.1 without patch ESX-9986131 VMware ESX 3.0.0 without patch ESX-3069097 VMware ESX 2.5.4 prior to upgrade patch 3 VMware ESX 2.5.3 prior to upgrade patch 6 VMware ESX 2.1.3 prior to upgrade patch 4 VMware ESX 2.0.2 prior to upgrade patch 4 3. Problem description: Problems addressed by these patches: a. Incorrect permissions on SSL key files generated by vmware-config (CVE-2006-3589): ESX 3.0.1: does not have this problem ESX 3.0.0: does not have this problem ESX 2.5.4: corrected by ESX 2.5.4 Upgrade Patch 3 (Build# 36502) ESX 2.5.3: corrected by ESX 2.5.3 Upgrade Patch 6 (Build# 35703) ESX 2.1.3: corrected by ESX 2.1.3 Upgrade Patch 4 (Build# 35803) ESX 2.0.2: corrected by ESX 2.0.2 Upgrade Patch 4 (Build# 35801) A possible security issue with the configuration program vmware-config which could set incorrect permissions on SSL key files. Local users may be able to obtain access to the SSL key files. The Common Vulnerabilities and Exposures project (cve.mitre.org) assigned the name CVE-2006-3589 to this issue. b. OpenSSL library vulnerabilities: ESX 3.0.1: corrected by ESX 3.0.1 Patch ESX-9986131 ESX 3.0.0: corrected by ESX 3.0.0 Patch ESX-3069097 ESX 2.5.4: corrected by ESX 2.5.4 Upgrade Patch 3 (Build# 36502) ESX 2.5.3: corrected by ESX 2.5.3 Upgrade Patch 6 (Build# 35703) ESX 2.1.3: corrected by ESX 2.1.3 Upgrade Patch 4 (Build# 35803) ESX 2.0.2: corrected by ESX 2.0.2 Upgrade Patch 4 (Build# 35801) (CVE-2006-2937) OpenSSL 0.9.7 before 0.9.7l and 0.9.8 before 0.9.8d allows remote attackers to cause a denial of service (infinite loop and memory consumption) via malformed ASN.1 structures that trigger an improperly handled error condition. (CVE-2006-2940) OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows attackers to cause a denial of service (CPU consumption) via parasitic public keys with large (1) "public exponent" or (2) "public modulus" values in X.509 certificates that require extra time to process when using RSA signature verification. (CVE-2006-4343) The get_server_hello function in the SSLv2 client code in OpenSSL 0.9.7 before 0.9.7l, 0.9.8 before 0.9.8d, and earlier versions allows remote servers to cause a denial of service (client crash) via unknown vectors that trigger a null pointer dereference. The Common Vulnerabilities and Exposures project (cve.mitre.org) assigned the names CVE-2006-2937, CVE-2006-2940, CVE-2006-3738, CVE-2006-4339, and CVE-2006-4343 to these issues. c. Updated OpenSSH package addresses the following possible security issues: ESX 3.0.1: corrected by Patch ESX-9986131 ESX 3.0.0: corrected by Patch ESX-3069097 ESX 2.5.4: does not have these problems ESX 2.5.3: does not have these problems ESX 2.1.3: does not have these problems ESX 2.0.2: does not have these problems (CVE-2004-2069) sshd.c in OpenSSH 3.6.1p2 and 3.7.1p2 and possibly other versions, when using privilege separation, does not properly signal the non-privileged process when a session has been terminated after exceeding the LoginGraceTime setting, which leaves the connection open and allows remote attackers to cause a denial of service (connection consumption). (CVE-2006-0225) scp in OpenSSH 4.2p1 allows attackers to execute arbitrary commands via filenames that contain shell metacharacters or spaces, which are expanded twice. (CVE-2003-0386) OpenSSH 3.6.1 and earlier, when restricting host access by numeric IP addresses and with VerifyReverseMapping disabled, allows remote attackers to bypass "from=" and "user@host" address restrictions by connecting to a host from a system whose reverse DNS hostname contains the numeric IP address. (CVE-2006-4924) sshd in OpenSSH before 4.4, when using the version 1 SSH protocol, allows remote attackers to cause a denial of service (CPU consumption) via an SSH packet that contains duplicate blocks, which is not properly handled by the CRC compensation attack detector. NOTE: ESX by default disables version 1 SSH protocol. (CVE-2006-5051) Signal handler race condition in OpenSSH before 4.4 allows remote attackers to cause a denial of service (crash), and possibly execute arbitrary code if GSSAPI authentication is enabled, via unspecified vectors that lead to a double-free. NOTE: ESX doesn't use GSSAPI by default. (CVE-2006-5794) Unspecified vulnerability in the sshd Privilege Separation Monitor in OpenSSH before 4.5 causes weaker verification that authentication has been successful, which might allow attackers to bypass authentication. NOTE: as of 20061108, it is believed that this issue is only exploitable by leveraging vulnerabilities in the unprivileged process, which are not known to exist. The Common Vulnerabilities and Exposures project (cve.mitre.org) assigned the names CVE-2004-2069, CVE-2006-0225, CVE-2003-0386, CVE-2006-4924, CVE-2006-5051, and CVE-2006-5794 to these issues. d. Object reuse problems with newly created virtual disk (.vmdk or .dsk) files: ESX 3.0.1: does not have this problem ESX 3.0.0: does not have this problem ESX 2.5.4: corrected by ESX 2.5.4 Upgrade Patch 3 (Build# 36502) ESX 2.5.3: corrected by ESX 2.5.3 Upgrade Patch 6 (Build# 35703) ESX 2.1.3: corrected by ESX 2.1.3 Upgrade Patch 4 (Build# 35803) ESX 2.0.2: corrected by ESX 2.0.2 Upgrade Patch 4 (Build# 35801) A possible security issue with virtual disk (.vmdk or .dsk) files that are newly created, but contain blocks from recently deleted virtual disk files. Information belonging to the previously deleted virtual disk files could be revealed in newly created virtual disk files. VMware recommends the following workaround: When creating new virtual machines on an ESX Server that may contain sensitive data, use vmkfstools with the -W option. This initializes the virtual disk with zeros. NOTE: ESX 3.x defines this option as -w. e. Buffer overflow in Python function repr(): ESX 3.0.1: corrected by Patch ESX-9986131 ESX 3.0.0: corrected by ESX-3069097 ESX 2.5.4: does not have this problem ESX 2.5.3: does not have this problem ESX 2.1.3: does not have this problem ESX 2.0.2: does not have this problem A possible security issue with how the Python function repr() function handles UTF-32/UCS-4 strings. The Common Vulnerabilities and Exposures project (cve.mitre.org) assigned the name CVE-2006-4980 to this issue. 4. Solution: Please review the Patch notes for your version of ESX and verify the md5sum. ESX 3.0.1 http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html md5usm: 239375e107fd4c7af57663f023863fcb ESX 3.0.0 http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html md5sum: ca9947239fffda708f2c94f519df33dc ESX 2.5.4 http://www.vmware.com/support/esx25/doc/esx-254-200612-patch.html md5sum: 239375e107fd4c7af57663f023863fcb ESX 2.5.3 http://www.vmware.com/support/esx25/doc/esx-253-200612-patch.html md5sum: f90fcab28362edbf2311f3ca90cc7739 ESX 2.1.3 http://www.vmware.com/support/esx21/doc/esx-213-200612-patch.html md5sum: 7d7d0e40f4dccd5ca64b9c13a856da8f ESX 2.0.2 http://www.vmware.com/support/esx2/doc/esx-202-200612-patch.html md5sum: 925e70f28d17714c53fdbd24de64329f 5. References: ESX 3.0.0 Patch URL: http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html Knowledge base URL: http://kb.vmware.com/kb/3069097 ESX 3.0.1 Patch URL: http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html Knowledge base URL: http://kb.vmware.com/kb/9986131 ESX 2.5.4 Patch URL: http://www.vmware.com/support/esx25/doc/esx-254-200612-patch.html ESX 2.5.3 Patch URL: http://www.vmware.com/support/esx25/doc/esx-253-200612-patch.html ESX 2.1.3 Patch URL: http://www.vmware.com/support/esx21/doc/esx-213-200612-patch.html ESX 2.0.2 Patch URL: http://www.vmware.com/support/esx2/doc/esx-202-200612-patch.html http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3589 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2937 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2940 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3738 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4339 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4343 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4980 6. Contact: http://www.vmware.com/security VMware Security Response Policy http://www.vmware.com/vmtn/technology/security/security_response.html E-mail: security@vmware.com Copyright 2007 VMware Inc. All rights reserved. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.6 (GNU/Linux) iD8DBQFFovs16KjQhy2pPmkRCMfyAKCXhdGwZyXW5VzSwcOmu2NNXKN/OwCgo+CE neFG0RikD74TCYeXKW6CBy4= =9/6k -----END PGP SIGNATURE----- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ . OpenSSL Security Advisory [5th September 2006] RSA Signature Forgery (CVE-2006-4339) ===================================== Vulnerability ------------- Daniel Bleichenbacher recently described an attack on PKCS #1 v1.5 signatures. Implementations may incorrectly verify the certificate if they are not checking for excess data in the RSA exponentiation result of the signature. Since there are CAs using exponent 3 in wide use, and PKCS #1 v1.5 is used in X.509 certificates, all software that uses OpenSSL to verify X.509 certificates is potentially vulnerable, as well as any other use of PKCS #1 v1.5. This includes software that uses OpenSSL for SSL or TLS. Recommendations --------------- There are multiple ways to avoid this vulnerability. Any one of the following measures is sufficient. The vulnerability is resolved in the following versions of OpenSSL: - in the 0.9.7 branch, version 0.9.7k (or later); - in the 0.9.8 branch, version 0.9.8c (or later). OpenSSL 0.9.8c and OpenSSL 0.9.7k are available for download via HTTP and FTP from the following master locations (you can find the various FTP mirrors under http://www.openssl.org/source/mirror.html): o http://www.openssl.org/source/ o ftp://ftp.openssl.org/source/ The distribution file names are: o openssl-0.9.8c.tar.gz MD5 checksum: 78454bec556bcb4c45129428a766c886 SHA1 checksum: d0798e5c7c4509d96224136198fa44f7f90e001d o openssl-0.9.7k.tar.gz MD5 checksum: be6bba1d67b26eabb48cf1774925416f SHA1 checksum: 90056b8f5e518edc9f74f66784fbdcfd9b784dd2 The checksums were calculated using the following commands: openssl md5 openssl-0.9*.tar.gz openssl sha1 openssl-0.9*.tar.gz 2. If this version upgrade is not an option at the present time, alternatively the following patch may be applied to the OpenSSL source code to resolve the problem. The patch is compatible with the 0.9.6, 0.9.7, 0.9.8, and 0.9.9 branches of OpenSSL. o http://www.openssl.org/news/patch-CVE-2006-4339.txt Whether you choose to upgrade to a new version or to apply the patch, make sure to recompile any applications statically linked to OpenSSL libraries. Acknowledgements ---------------- The OpenSSL team thank Philip Mackenzie, Marius Schilder, Jason Waddle and Ben Laurie, of Google Security, who successfully forged various certificates, showing OpenSSL was vulnerable, and provided the patch to fix the problems. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c00849540 Version: 1 HPSBUX02186 SSRT071299 rev.1 - HP-UX running Apache Remote Execution of Arbitrary Code, Denial of Service (DoS), Unauthorized Access NOTICE: The information in this Security Bulletin should be acted upon as soon as possible. Release Date: 2007-01-17 Last Updated: 2007-01-23 Potential Security Impact: Remote execution of arbitrary code, Denial of Service (DoS), and unauthorized access. Source: Hewlett-Packard Company, HP Software Security Response Team VULNERABILITY SUMMARY Potential security vulnerabilities have been identified with Apache running on HP-UX. References: CVE-2006-2940, CVE-2006-2937, CVE-2006-3738, CVE-2006-4343, CVE-2006-4339, CVE-2005-2969. SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. HP-UX B.11.11, B.11.23, and B.11.31 running Apache-based Web Server prior to v.2.0.58.01 BACKGROUND AFFECTED VERSIONS For IPv4: HP-UX B.11.00 HP-UX B.11.11 =========== hpuxwsAPACHE action: install revision A.2.0.58.01 or subsequent restart Apache URL:http://h20293.www2.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=HPUXWSSUITE For IPv6: HP-UX B.11.11 =========== hpuxwsAPACHE,revision=B.1.0.00.01 hpuxwsAPACHE,revision=B.1.0.07.01 hpuxwsAPACHE,revision=B.1.0.08.01 hpuxwsAPACHE,revision=B.1.0.09.01 hpuxwsAPACHE,revision=B.1.0.10.01 hpuxwsAPACHE,revision=B.2.0.48.00 hpuxwsAPACHE,revision=B.2.0.49.00 hpuxwsAPACHE,revision=B.2.0.50.00 hpuxwsAPACHE,revision=B.2.0.51.00 hpuxwsAPACHE,revision=B.2.0.52.00 hpuxwsAPACHE,revision=B.2.0.53.00 hpuxwsAPACHE,revision=B.2.0.54.00 hpuxwsAPACHE,revision=B.2.0.55.00 hpuxwsAPACHE,revision=B.2.0.56.00 hpuxwsAPACHE,revision=B.2.0.58.00 action: install revision B.2.0.58.01 or subsequent restart Apache URL:http://h20293.www2.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=HPUXWSSUITE HP-UX B.11.23 =========== hpuxwsAPACHE action: install revision B.2.0.58.01 or subsequent restart Apache URL:http://h20293.www2.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=HPUXWSSUITE END AFFECTED VERSIONS RESOLUTION HP has made the following software updates available to resolve the issue. Software updates for the Apache-based Web Server are available from: http://h20293.www2.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=HPUXWSSUITE HP-UX B.11.00, B.11.11 and HP-UX B.11.23 require the Apache-based Web Server v.2.0.58.01 or subsequent. Apache Update Procedure Check for Apache Installation ----------------------------- To determine if the Apache web server from HP is installed on your system, use Software Distributor's swlist command. All three revisions of the product may co-exist on a single system. For example, the results of the command swlist -l product | grep -I apache hpuxwsAPACHE B.2.0.55.00 HP-UX Apache-based Web Server Stop Apache ------------- Before updating, make sure the previous Apache binary is stopped. If Apache is not stopped, the installation would be successful but the new version would be prevented from starting until a later time. After determining which Apache is installed, stop Apache with the following commands: for hpuxwsAPACHE: /opt/hpws/apache[32]/bin/apachectl stop Download and Install Apache -------------------------- Download Apache from Software Depot. http://h20293.www2.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=HPUXWSSUITE Verify successful download by comparing the cksum with the value specified on the installation web page. Use SD to swinstall the depot. Installation of this new revision of HP Apache over an existing HP Apache installation is supported, while installation over a non-HP Apache is NOT supported. Removing Apache Installation --------------------------- The potential vulnerability can also be resolved by removing Apache rather than installing a newer revision. To remove Apache use both Software Distributor's "swremove" command and also "rm -rf" the home location as specified in the rc.config.d file "HOME" variables. %ls /etc/rc.config.d | \ grep apache hpapache2conf hpws_apache[32]conf MANUAL ACTIONS: Yes - Update plus other actions Install the revision of the product. PRODUCT SPECIFIC INFORMATION HP-UX Security Patch Check: Security Patch Check revision B.02.00 analyzes all HP-issued Security Bulletins to provide a subset of recommended actions that potentially affect a specific HP-UX system. For more information: http://software.hp.com/portal/swdepot/displayProductInfo.do?productNumber=B6834AA HISTORY: rev.1 - 23 January 2007 Initial Release Third Party Security Patches: Third party security patches which are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy. Support: For further information, contact normal HP Services support channel. Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com It is strongly recommended that security related information being communicated to HP be encrypted using PGP, especially exploit information. To get the security-alert PGP key, please send an e-mail message as follows: To: security-alert@hp.com Subject: get key Subscribe: To initiate a subscription to receive future HP Security Bulletins via Email: http://h30046.www3.hp.com/driverAlertProfile.php?regioncode=NA&langcode=USENG&jumpid=in_SC-GEN__driverITRC&topiccode=ITRC On the web page: ITRC security bulletins and patch sign-up Under Step1: your ITRC security bulletins and patches - check ALL categories for which alerts are required and continue. Under Step2: your ITRC operating systems - verify your operating system selections are checked and save. To update an existing subscription: http://h30046.www3.hp.com/subSignIn.php Log in on the web page: Subscriber's choice for Business: sign-in. On the web page: Subscriber's Choice: your profile summary - use Edit Profile to update appropriate sections. To review previously published Security Bulletins visit: http://www.itrc.hp.com/service/cki/secBullArchive.do * The Software Product Category that this Security Bulletin relates to is represented by the 5th and 6th characters of the Bulletin number in the title: GN = HP General SW MA = HP Management Agents MI = Misc. 3rd Party SW MP = HP MPE/iX NS = HP NonStop Servers OV = HP OpenVMS PI = HP Printing & Imaging ST = HP Storage SW TL = HP Trusted Linux TU = HP Tru64 UNIX UX = HP-UX VV = HP VirtualVault System management and security procedures must be reviewed frequently to maintain system integrity. HP is continually reviewing and enhancing the security features of software products to provide customers with current secure solutions. "HP is broadly distributing this Security Bulletin in order to bring to the attention of users of the affected HP products the important security information contained in this Bulletin. HP recommends that all users determine the applicability of this information to their individual situations and take appropriate action. HP does not warrant that this information is necessarily accurate or complete for all user situations and, consequently, HP will not be responsible for any damages resulting from user's use or disregard of the information provided in this Bulletin. To the extent permitted by law, HP disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose, title and non-infringement." \xa9Copyright 2007 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental, special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. Background ========== The Mozilla Network Security Service is a library implementing security features like SSL v.2/v.3, TLS, PKCS #5, PKCS #7, PKCS #11, PKCS #12, S/MIME and X.509 certificates. This impacts any software using the NSS library, like the Mozilla products Firefox, Thunderbird and Seamonkey. Workaround ========== There is no known workaround at this time. Resolution ========== All NSS users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=dev-libs/nss-3.11.3" Note: As usual after updating a library, you should run 'revdep-rebuild' (from the app-portage/gentoolkit package) to ensure that all applications linked to it are properly rebuilt. References ========== [ 1 ] CVE-2006-4339 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4339 [ 2 ] CVE-2006-4340 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4340 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-200610-06.xml Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at http://bugs.gentoo.org. License ======= Copyright 2006 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5 . ---------------------------------------------------------------------- Secunia integrated with Microsoft WSUS http://secunia.com/blog/71/ ---------------------------------------------------------------------- TITLE: OpenOffice.org 3 Multiple Vulnerabilities SECUNIA ADVISORY ID: SA38568 VERIFY ADVISORY: http://secunia.com/advisories/38568/ DESCRIPTION: Some vulnerabilities have been reported in OpenOffice.org, which can be exploited by malicious people to bypass certain security restrictions, conduct spoofing attacks, or compromise a user's system. This is related to: SA21709 2) An error in the included libxmlsec library can be exploited to potentially forge a valid signature. For more information: SA35854 3) An error in the included MSVC Runtime package can be exploited to bypass certain security features. 5) An error in the processing GIF files can be exploited to potentially execute arbitrary code. 6) An error in the processing of Word documents can be exploited to potentially execute arbitrary code. PROVIDED AND/OR DISCOVERED BY: The vendor credits: 4) Sebastian Apelt of siberas 5) Frank Rei\xdfner and Sebastian Apelt of siberas 6) Nicolas Joly of Vupen ORIGINAL ADVISORY: http://www.openoffice.org/security/cves/CVE-2006-4339.html http://www.openoffice.org/security/cves/CVE-2009-0217.html http://www.openoffice.org/security/cves/CVE-2009-2493.html http://www.openoffice.org/security/cves/CVE-2009-2949.html http://www.openoffice.org/security/cves/CVE-2009-2950.html http://www.openoffice.org/security/cves/CVE-2009-3301-3302.html OTHER REFERENCES: SA21709: http://secunia.com/advisories/21709/ SA35854: http://secunia.com/advisories/35854/ SA35967: http://secunia.com/advisories/35967/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . HP-UX B.11.04 running Virtualvault 4.7 or Virtualvault 4.6 or Virtualvault 4.5 or HP WebProxy. BACKGROUND The OpenSSL community has released OpenSSL 0.9.7.k version superseding the OpenSSL 0.9.7i release that was identified in the CVE report. Note: To determine if a system has an affected version, search the output of "swlist -a revision -l fileset" for an affected fileset. Then determine if the recommended patch or update is installed. The following supported software versions are affected: HP Tru64 UNIX v 5.1B-4 (SSL and BIND) HP Tru64 UNIX v 5.1B-3 (SSL and BIND) HP Tru64 UNIX v 5.1A PK6 (BIND) HP Tru64 UNIX v 4.0G PK4 (BIND) HP Tru64 UNIX v 4.0F PK8 (BIND) Internet Express (IX) v 6.6 BIND (BIND) HP Insight Management Agents for Tru64 UNIX patch v 3.5.2 and earlier (SSL) BACKGROUND RESOLUTION HP has released the following Early Release Patch kits (ERPs) publicly for use by any customer. The ERP kits use dupatch to install and will not install over any Customer Specific Patches (CSPs) that have file intersections with the ERP. A new patch version for HP Insight Management Agents for Tru64 UNIX is also available that addresses the potential vulnerabilities. The fixes contained in the ERP kits will be available in the following mainstream releases: -Targeted for availability in HP Tru64 UNIX v 5.1B-5 -Internet Express (IX) v 6.7 -HP Insight Management Agents for Tru64 UNIX patch v 3.6.1 (already available) HP Tru64 UNIX Version 5.1B-4 ERP Kit Location: http://www.itrc.hp.com/service/patch/patchDetail.do?patchid=T64KIT1001167-V51BB27-ES-20070321 Name: T64KIT1001167-V51BB27-ES-20070321 MD5 Checksum: a697a90bd0b1116b6f27d1100bbf81fd HP Tru64 UNIX Version 5.1B-3 ERP Kit Location: http://www.itrc.hp.com/service/patch/patchDetail.do?patchid=T64KIT1001163-V51BB26-ES-20070315 Name: T64KIT1001163-V51BB26-ES-20070315 MD5 Checksum: d376d403176f0dbe7badd4df4e91c126 HP Tru64 UNIX Version 5.1A PK6 ERP Kit Location: http://www.itrc.hp.com/service/patch/patchDetail.do?patchid=T64KIT1001160-V51AB24-ES-20070314 Name: T64KIT1001160-V51AB24-ES-20070314 MD5 Checksum: 7bb43ef667993f7c4711b6cf978e0aa7 HP Tru64 UNIX Version 4.0G PK4 ERP Kit Location: http://www.itrc.hp.com/service/patch/patchDetail.do?patchid=T64KIT1001166-V40GB22-ES-20070316 Name: T64KIT1001166-V40GB22-ES-20070316 MD5 Checksum: a446c39169b769c4a03c654844d5ac45 HP Tru64 UNIX Version 4.0F PK8 ERP Kit Location: http://www.itrc.hp.com/service/patch/patchDetail.do?patchid=DUXKIT1001165-V40FB22-ES-20070316 Name: DUXKIT1001165-V40FB22-ES-20070316 MD5 Checksum: 718148c87a913536b32a47af4c36b04e HP Insight Management Agents for Tru64 UNIX patch version 3.6.1 (for kit CPQIIM360) Location: http://h30097.www3.hp.com/cma/patches.html Name: CPQIM360.SSL.01.tar.gz MD5 Checksum: 1001a10ab642461c87540826dfe28652 Internet Express (IX) v 6.6 BIND Note: Customers who use Internet Express (IX) v 6.6 BIND should install the BIND 9.2.8 patch from the ERP kit appropriate for their base operating system version. PRODUCT SPECIFIC INFORMATION The HP Tru64 UNIX v 5.1B-3 and v 5.1B-4 ERP kits distribute two patches: -OpenSSL 0.9.8d -BIND 9.2.8 built with OpenSSL 0.9.8d Note: HP Tru64 UNIX v 5.1A, v 4.0G, and v 4.0F releases did not distribute OpenSSL and so their ERP kits provide only the BIND 9.2.8 patch that has been built with OpenSSL 0.9.8d Customers who have been using OpenSSL on HP Tru64 UNIX v 5.1B-3 and v 5.1B-4 should install the OpenSSL patch from the ERP kit appropriate for their base operating system version. The HP Insight Management Agents for Tru64 UNIX patch contains OpenSSL 0.9.8d and is applicable for HP Tru64 UNIX v 5.1A, v 5.1B-3, and v 5.1B-4

Trust: 7.2

sources: NVD: CVE-2006-4339 // CERT/CC: VU#221788 // JVNDB: JVNDB-2006-000532 // JVNDB: JVNDB-2007-000772 // JVNDB: JVNDB-2012-000079 // CERT/CC: VU#386964 // CERT/CC: VU#547300 // CERT/CC: VU#845620 // BID: 22083 // BID: 19849 // PACKETSTORM: 51021 // PACKETSTORM: 53566 // PACKETSTORM: 49749 // PACKETSTORM: 53990 // PACKETSTORM: 51167 // PACKETSTORM: 86249 // PACKETSTORM: 51624 // PACKETSTORM: 56053

AFFECTED PRODUCTS

vendor:oraclemodel: - scope: - version: -

Trust: 3.2

vendor:debian gnu linuxmodel: - scope: - version: -

Trust: 2.4

vendor:f5model: - scope: - version: -

Trust: 2.4

vendor:freebsdmodel: - scope: - version: -

Trust: 2.4

vendor:openpkgmodel: - scope: - version: -

Trust: 2.4

vendor:opensslmodel: - scope: - version: -

Trust: 2.4

vendor:red hatmodel: - scope: - version: -

Trust: 2.4

vendor:suse linuxmodel: - scope: - version: -

Trust: 2.4

vendor:slackware linuxmodel: - scope: - version: -

Trust: 2.4

vendor:ubuntumodel: - scope: - version: -

Trust: 2.4

vendor:rpathmodel: - scope: - version: -

Trust: 2.4

vendor:hitachimodel:cosminexus application server enterprisescope:eqversion:version 6

Trust: 2.4

vendor:hitachimodel:cosminexus application server standardscope:eqversion:version 6

Trust: 2.4

vendor:hitachimodel:cosminexus application server version 5scope: - version: -

Trust: 2.4

vendor:hitachimodel:cosminexus developer light version 6scope: - version: -

Trust: 2.4

vendor:hitachimodel:cosminexus developer professional version 6scope: - version: -

Trust: 2.4

vendor:hitachimodel:cosminexus developer standard version 6scope: - version: -

Trust: 2.4

vendor:hitachimodel:cosminexus developer version 5scope: - version: -

Trust: 2.4

vendor:hitachimodel:cosminexus server - enterprise editionscope: - version: -

Trust: 2.4

vendor:hitachimodel:cosminexus server - standard editionscope: - version: -

Trust: 2.4

vendor:hitachimodel:cosminexus server - standard edition version 4scope: - version: -

Trust: 2.4

vendor:hitachimodel:cosminexus server - web editionscope: - version: -

Trust: 2.4

vendor:hitachimodel:cosminexus server - web edition version 4scope: - version: -

Trust: 2.4

vendor:hitachimodel:web serverscope: - version: -

Trust: 2.4

vendor:hitachimodel:ucosminexus application server enterprisescope: - version: -

Trust: 2.4

vendor:hitachimodel:ucosminexus application server standardscope: - version: -

Trust: 2.4

vendor:hitachimodel:ucosminexus developerscope:eqversion:professional

Trust: 2.4

vendor:hitachimodel:ucosminexus developer lightscope: - version: -

Trust: 2.4

vendor:hitachimodel:ucosminexus developer standardscope: - version: -

Trust: 2.4

vendor:hitachimodel:ucosminexus service architectscope: - version: -

Trust: 2.4

vendor:hitachimodel:ucosminexus service platformscope: - version: -

Trust: 2.4

vendor:trustix secure linuxmodel: - scope: - version: -

Trust: 1.6

vendor:sunmodel:jre 011scope:eqversion:1.2.2

Trust: 1.5

vendor:sunmodel:sdk 011scope:eqversion:1.2.2

Trust: 1.5

vendor:sunmodel:jre 010scope:eqversion:1.2.2

Trust: 1.5

vendor:sunmodel:sdk 010scope:eqversion:1.2.2

Trust: 1.2

vendor:sunmodel:jre 013scope:eqversion:1.2.2

Trust: 1.2

vendor:sunmodel:jre 014scope:eqversion:1.2.2

Trust: 1.2

vendor:sunmodel:jrescope:eqversion:1.2.2

Trust: 1.2

vendor:opensslmodel:opensslscope:eqversion:0.9.8b

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.2b

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.6

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.6f

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.6m

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.6a

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.5

Trust: 1.0

vendor:opensslmodel:opensslscope:lteversion:0.9.7

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.6b

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.6i

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.6k

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.6l

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.3

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.1c

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.6e

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.7j

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.8

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.6j

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.7d

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.7g

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.7e

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.6g

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.7f

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.6h

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.7c

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.5a

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.7i

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.7a

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.7h

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.3a

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.8a

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.6c

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.6d

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.7b

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.4

Trust: 1.0

vendor:sunmodel:sdk 08scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:sdk 11scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:sdk 15scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:jrescope:eqversion:1.5

Trust: 0.9

vendor:sunmodel:jrescope:eqversion:1.1.8

Trust: 0.9

vendor:sunmodel:jre 06scope:eqversion:1.5

Trust: 0.9

vendor:sunmodel:jre 015scope:eqversion:1.2.2

Trust: 0.9

vendor:sunmodel:jre 01scope:eqversion:1.4.1

Trust: 0.9

vendor:sunmodel:jre 10scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:jre 14scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:sdk 03scope:eqversion:1.4.1

Trust: 0.9

vendor:sunmodel:jdk 09scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jdk 007scope:eqversion:1.1.6

Trust: 0.9

vendor:sunmodel:jre 1.4.2 12scope: - version: -

Trust: 0.9

vendor:sunmodel:sdk 06scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:jre 02scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:sdk .0 02scope:eqversion:1.3

Trust: 0.9

vendor:sunmodel:jre .0 04scope:eqversion:1.4

Trust: 0.9

vendor:sunmodel:jrescope:eqversion:1.4

Trust: 0.9

vendor:sunmodel:jre 07scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:jre 11scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:jre 03scope:eqversion:1.4.1

Trust: 0.9

vendor:sunmodel:sdk 02scope:eqversion:1.4.1

Trust: 0.9

vendor:sunmodel:jre 01scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jre 04scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jre .0 02scope:eqversion:1.3

Trust: 0.9

vendor:sunmodel:sdk 07scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:jdk b 005scope:eqversion:1.1.7

Trust: 0.9

vendor:sunmodel:sdk 10scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:jre 02scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:sdkscope:eqversion:1.2

Trust: 0.9

vendor:sunmodel:jre 01scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:jre .0 03scope:eqversion:1.4

Trust: 0.9

vendor:sunmodel:sdk .0 03scope:eqversion:1.4

Trust: 0.9

vendor:sunmodel:jre 02scope:eqversion:1.4.1

Trust: 0.9

vendor:sunmodel:sdk 09scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:sdk 14scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:jdk .0 05scope:eqversion:1.5

Trust: 0.9

vendor:sunmodel:jre 06scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:sdk 12scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:jrescope:eqversion:1.4.1

Trust: 0.9

vendor:sunmodel:jre 03scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:sdk 02scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:sdkscope:eqversion:1.4.1

Trust: 0.9

vendor:sunmodel:sdk 08scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:sdk .0 4scope:eqversion:1.4

Trust: 0.9

vendor:sunmodel:sdk .0 02scope:eqversion:1.4

Trust: 0.9

vendor:sunmodel:sdk 007scope:eqversion:1.2.2

Trust: 0.9

vendor:sunmodel:jrescope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jrescope:eqversion:1.2.1

Trust: 0.9

vendor:sunmodel:jre 06scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:sdk 01scope:eqversion:1.4.1

Trust: 0.9

vendor:sunmodel:jre .0 02scope:eqversion:1.4

Trust: 0.9

vendor:sunmodel:jre 13scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:sdkscope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:sdk 13scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:jdk 008scope:eqversion:1.1.8

Trust: 0.9

vendor:sunmodel:jdk 08scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jre 05scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jre 08scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:jrescope:eqversion:1.2

Trust: 0.9

vendor:sunmodel:sdk 04scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jre 12scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:sdk 05scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:sdk 03scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jre 03scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:sdkscope:eqversion:1.4

Trust: 0.9

vendor:sunmodel:jre .0 05scope:eqversion:1.3

Trust: 0.9

vendor:sunmodel:jre 05scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:sdk 05scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:sdk 03scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:sdk 015scope:eqversion:1.2.2

Trust: 0.9

vendor:sunmodel:sdkscope:eqversion:1.2.1

Trust: 0.9

vendor:sunmodel:sdk 012scope:eqversion:1.2.2

Trust: 0.9

vendor:sunmodel:jre 09scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:sdk 014scope:eqversion:1.2.2

Trust: 0.9

vendor:sunmodel:jre 007scope:eqversion:1.2.2

Trust: 0.9

vendor:sunmodel:jdk 009scope:eqversion:1.1.8

Trust: 0.9

vendor:appgate network securitymodel: - scope: - version: -

Trust: 0.8

vendor:apple computermodel: - scope: - version: -

Trust: 0.8

vendor:attachmatewrqmodel: - scope: - version: -

Trust: 0.8

vendor:avayamodel: - scope: - version: -

Trust: 0.8

vendor:blue coatmodel: - scope: - version: -

Trust: 0.8

vendor:ciscomodel: - scope: - version: -

Trust: 0.8

vendor:gentoo linuxmodel: - scope: - version: -

Trust: 0.8

vendor:gnutlsmodel: - scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel: - scope: - version: -

Trust: 0.8

vendor:iaik java groupmodel: - scope: - version: -

Trust: 0.8

vendor:ibmmodel: - scope: - version: -

Trust: 0.8

vendor:internet consortiummodel: - scope: - version: -

Trust: 0.8

vendor:intotomodel: - scope: - version: -

Trust: 0.8

vendor:junipermodel: - scope: - version: -

Trust: 0.8

vendor:mandrivamodel: - scope: - version: -

Trust: 0.8

vendor:mozillamodel: - scope: - version: -

Trust: 0.8

vendor:openwall gnu linuxmodel: - scope: - version: -

Trust: 0.8

vendor:operamodel: - scope: - version: -

Trust: 0.8

vendor:rsa securitymodel: - scope: - version: -

Trust: 0.8

vendor:ssh security corpmodel: - scope: - version: -

Trust: 0.8

vendor:sun microsystemsmodel: - scope: - version: -

Trust: 0.8

vendor:sybasemodel: - scope: - version: -

Trust: 0.8

vendor:vmwaremodel: - scope: - version: -

Trust: 0.8

vendor:vandykemodel: - scope: - version: -

Trust: 0.8

vendor:stonesoftmodel: - scope: - version: -

Trust: 0.8

vendor:adobemodel:readerscope:lteversion:8.x

Trust: 0.8

vendor:cybertrustmodel:asianux serverscope:eqversion:3.0

Trust: 0.8

vendor:sendmailmodel:advanced message serverscope:eqversion:2.2

Trust: 0.8

vendor:fujitsumodel:teamware officescope:eqversion:200x security options v2.0l10

Trust: 0.8

vendor:fujitsumodel:teamware officescope:eqversion:security options v5.3l13

Trust: 0.8

vendor:openofficemodel:openoffice.orgscope:eqversion:2

Trust: 0.8

vendor:furukawa electricmodel:fitelnet-f seriesscope:eqversion:fitelnet-f80

Trust: 0.8

vendor:sun microsystemsmodel:jdkscope:lteversion:5.0 update 8 and earlier

Trust: 0.8

vendor:turbo linuxmodel:turbolinux fujiscope: - version: -

Trust: 0.8

vendor:sun microsystemsmodel:jrescope:lteversion:1.4.2_12 and earlier

Trust: 0.8

vendor:turbo linuxmodel:turbolinux desktopscope:eqversion:10

Trust: 0.8

vendor:sun microsystemsmodel:one application serverscope:eqversion:7

Trust: 0.8

vendor:trend micromodel:interscan gateway security appliancescope: - version: -

Trust: 0.8

vendor:beamodel:weblogic serverscope:eqversion:9.2

Trust: 0.8

vendor:beamodel:weblogic expressscope:eqversion:9.1

Trust: 0.8

vendor:necmodel:ip8800/700 seriesscope: - version: -

Trust: 0.8

vendor:beamodel:weblogic serverscope:lteversion:8.1 sp 6 and earlier

Trust: 0.8

vendor:necmodel:pki server /carassuit verification serverscope:eqversion:ver1.1

Trust: 0.8

vendor:necmodel:secureware/pki application development kitscope:eqversion:ver2.0 ssl option

Trust: 0.8

vendor:oraclemodel:http serverscope:eqversion:9.2.0.8

Trust: 0.8

vendor:sun microsystemsmodel:jrescope:lteversion:1.3.1_19 and earlier

Trust: 0.8

vendor:furukawa electricmodel:mucho seriesscope:eqversion:mucho-ev/pk

Trust: 0.8

vendor:sun microsystemsmodel:j2sescope:lteversion:1.0.3_03 and earlier

Trust: 0.8

vendor:sun microsystemsmodel:one application serverscope:eqversion:platform edition 8.1 2005 q1

Trust: 0.8

vendor:sun microsystemsmodel:java enterprise systemscope:eqversion:2005q1 2005q4

Trust: 0.8

vendor:cybertrustmodel:asianux serverscope:eqversion:2.1

Trust: 0.8

vendor:beamodel:weblogic expressscope:lteversion:8.1 sp 6 and earlier

Trust: 0.8

vendor:red hatmodel:enterprise linux desktopscope:eqversion:4.0

Trust: 0.8

vendor:sun microsystemsmodel:sdkscope:lteversion:1.4.2_12 and earlier

Trust: 0.8

vendor:applemodel:mac os x serverscope:eqversion:v10.3.9

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:3 (es)

Trust: 0.8

vendor:allied telesismodel:centrecomscope:eqversion:ar410v2

Trust: 0.8

vendor:turbo linuxmodel:homescope: - version: -

Trust: 0.8

vendor:turbo linuxmodel:turbolinux multimediascope: - version: -

Trust: 0.8

vendor:necmodel:secureware/ electronic signature development kitscope:eqversion:ver1.0 ssl option (linux edition )

Trust: 0.8

vendor:beamodel:weblogic expressscope:eqversion:9.0

Trust: 0.8

vendor:trend micromodel:trendmicro interscan viruswallscope: - version: -

Trust: 0.8

vendor:ssh securitymodel:tectia clientscope:lteversion:5.1.0 and earlier

Trust: 0.8

vendor:necmodel:enterprisedirectoryserverscope:eqversion:all versions

Trust: 0.8

vendor:beamodel:weblogic serverscope:eqversion:9.1

Trust: 0.8

vendor:sun microsystemsmodel:java system web serverscope:lteversion:6.1 sp6 and earlier

Trust: 0.8

vendor:sun microsystemsmodel:java system application serverscope:eqversion:enterprise edition 8.1 2005 q1

Trust: 0.8

vendor:iscmodel:bindscope:lteversion:9.3.2-p1 and earlier

Trust: 0.8

vendor:furukawa electricmodel:fitelnet-f seriesscope:eqversion:fitelnet-f100

Trust: 0.8

vendor:red hatmodel:linux advanced workstationscope:eqversion:2.1

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:v10.4.8

Trust: 0.8

vendor:allied telesismodel:centrecomscope:eqversion:ar740

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:4 (as)

Trust: 0.8

vendor:necmodel:secureware/ security packscope: - version: -

Trust: 0.8

vendor:turbo linuxmodel:turbolinux appliance serverscope:eqversion:2.0

Trust: 0.8

vendor:opensslmodel:opensslscope:lteversion:0.9.7j and earlier

Trust: 0.8

vendor:sun microsystemsmodel:one web proxy serverscope:eqversion:3.6

Trust: 0.8

vendor:hewlett packardmodel:hp-uxscope:eqversion:11.11

Trust: 0.8

vendor:turbo linuxmodel:turbolinux serverscope:eqversion:10

Trust: 0.8

vendor:furukawa electricmodel:fitelnet-f seriesscope:eqversion:fitelnet-f40 ( pki only if the option is applied)

Trust: 0.8

vendor:trend micromodel:trendmicro interscan web security suitescope: - version: -

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:3 (ws)

Trust: 0.8

vendor:applemodel:mac os x serverscope:eqversion:v10.4.8

Trust: 0.8

vendor:turbo linuxmodel:turbolinux appliance serverscope:eqversion:1.0 (workgroup)

Trust: 0.8

vendor:furukawa electricmodel:fitelnet-f seriesscope:eqversion:fitelnet-f1000

Trust: 0.8

vendor:beamodel:weblogic serverscope:eqversion:9.0

Trust: 0.8

vendor:turbo linuxmodel:turbolinux appliance serverscope:eqversion:1.0 (hosting)

Trust: 0.8

vendor:turbo linuxmodel:turbolinux serverscope:eqversion:8

Trust: 0.8

vendor:ssh securitymodel:tectia serverscope:lteversion:5.1.0 and earlier

Trust: 0.8

vendor:trend micromodel:interscan messaging security suitescope: - version: -

Trust: 0.8

vendor:allied telesismodel:centrecomscope:eqversion:ar450s

Trust: 0.8

vendor:allied telesismodel:swimradiusscope: - version: -

Trust: 0.8

vendor:turbo linuxmodel:turbolinux serverscope:eqversion:7

Trust: 0.8

vendor:beamodel:weblogic serverscope:lteversion:7.0 sp 7 and earlier

Trust: 0.8

vendor:iscmodel:bindscope:lteversion:9.2.6-p1 and earlier

Trust: 0.8

vendor:hewlett packardmodel:hp-uxscope:eqversion:11.23

Trust: 0.8

vendor:fujitsumodel:teamware officescope:eqversion:200x security options v2.0l30

Trust: 0.8

vendor:sendmailmodel:switch for windowsscope:eqversion:3.1.5

Trust: 0.8

vendor:sun microsystemsmodel:solarisscope:eqversion:9 (sparc)

Trust: 0.8

vendor:sendmailmodel:switchscope:lteversion:3.2.4 and earlier

Trust: 0.8

vendor:fujitsumodel:teamware officescope:eqversion:200x security options v1.0l10

Trust: 0.8

vendor:fujitsumodel:teamware officescope:eqversion:200x security options v2.0l20

Trust: 0.8

vendor:sun microsystemsmodel:solarisscope:eqversion:8 (x86)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:2.1 (ws)

Trust: 0.8

vendor:sun microsystemsmodel:solarisscope:eqversion:10 (x86)

Trust: 0.8

vendor:fujitsumodel:teamware officescope:eqversion:security options v5.3l11

Trust: 0.8

vendor:red hatmodel:enterprise linux desktopscope:eqversion:3.0

Trust: 0.8

vendor:cybertrustmodel:asianux serverscope:eqversion:3.0 (x86-64)

Trust: 0.8

vendor:oraclemodel:e-business suitescope:eqversion:11.5.10cu2

Trust: 0.8

vendor:turbo linuxmodel:turbolinux personalscope: - version: -

Trust: 0.8

vendor:turbo linuxmodel:turbolinux serverscope:eqversion:10 (x64)

Trust: 0.8

vendor:cybertrustmodel:asianux serverscope:eqversion:2.0

Trust: 0.8

vendor:sun microsystemsmodel:java system web proxy serverscope:lteversion:4.0 sp3 and earlier

Trust: 0.8

vendor:sun microsystemsmodel:java system application serverscope:eqversion:7 2004q2

Trust: 0.8

vendor:trend micromodel:serverprotectscope:eqversion:for linux

Trust: 0.8

vendor:furukawa electricmodel:fitelnet-f seriesscope:eqversion:fitelnet-f120

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:2.1 (as)

Trust: 0.8

vendor:hewlett packardmodel:hp-uxscope:eqversion:11.04

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:4 (es)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:4 (ws)

Trust: 0.8

vendor:necmodel:pki server /carassuit verification serverscope:eqversion:ver1.0

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:v10.4.10

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:2.1 (es)

Trust: 0.8

vendor:beamodel:weblogic expressscope:eqversion:9.2

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:v10.3.9

Trust: 0.8

vendor:allied telesismodel:centrecomscope:eqversion:ar415s

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:3 (as)

Trust: 0.8

vendor:allied telesismodel:centrecomscope:eqversion:ar550s

Trust: 0.8

vendor:sun microsystemsmodel:solarisscope:eqversion:8 (sparc)

Trust: 0.8

vendor:beamodel:weblogic expressscope:lteversion:7.0 sp 7 and earlier

Trust: 0.8

vendor:opensslmodel:opensslscope:lteversion:0.9.8b and earlier

Trust: 0.8

vendor:sun microsystemsmodel:java enterprise systemscope:eqversion:2004q2

Trust: 0.8

vendor:sun microsystemsmodel:solarisscope:eqversion:9 (x86)

Trust: 0.8

vendor:applemodel:mac os x serverscope:eqversion:v10.4.10

Trust: 0.8

vendor:allied telesismodel:centrecomscope:eqversion:ar570s

Trust: 0.8

vendor:sun microsystemsmodel:java system web serverscope:lteversion:6.0 sp10 and earlier

Trust: 0.8

vendor:sun microsystemsmodel:jdkscope:lteversion:1.3.1_19 and earlier

Trust: 0.8

vendor:sun microsystemsmodel:jrescope:lteversion:5.0 update 8 and earlier

Trust: 0.8

vendor:turbo linuxmodel:turbolinuxscope:eqversion:10_f

Trust: 0.8

vendor:sun microsystemsmodel:solarisscope:eqversion:10 (sparc)

Trust: 0.8

vendor:sun microsystemsmodel:java enterprise systemscope:eqversion:2003q4

Trust: 0.8

vendor:sunmodel:jre 005scope:eqversion:1.2.2

Trust: 0.6

vendor:sunmodel:jre 04scope:eqversion:1.3.1

Trust: 0.6

vendor:sunmodel:jre .0 01scope:eqversion:1.4

Trust: 0.6

vendor:sunmodel:jdk 003scope:eqversion:1.2.1

Trust: 0.6

vendor:sunmodel:jre 12scope:eqversion:1.4.2

Trust: 0.6

vendor:sunmodel:jdkscope:eqversion:1.1.8

Trust: 0.6

vendor:sunmodel:jdk 06scope:eqversion:1.2.2

Trust: 0.6

vendor:sunmodel:jre 007scope:eqversion:1.1.8

Trust: 0.6

vendor:sunmodel:jdk .0 04scope:eqversion:1.5

Trust: 0.6

vendor:sunmodel:jdk 005scope:eqversion:1.1.8

Trust: 0.6

vendor:sunmodel:jrescope:eqversion:1.3

Trust: 0.6

vendor:sunmodel:sdk 13scope:eqversion:1.2.2

Trust: 0.6

vendor:sunmodel:sdk 005scope:eqversion:1.2.2

Trust: 0.6

vendor:sunmodel:jre .0 04scope:eqversion:1.3

Trust: 0.6

vendor:sunmodel:jdk 006scope:eqversion:1.2.2

Trust: 0.6

vendor:sunmodel:sdk 01scope:eqversion:1.3.1

Trust: 0.6

vendor:sunmodel:jdk 05scope:eqversion:1.2.2

Trust: 0.6

vendor:sunmodel:jdk 007scope:eqversion:1.1.8

Trust: 0.6

vendor:sunmodel:jdk .0 03scope:eqversion:1.5

Trust: 0.6

vendor:sunmodel:jre 12scope:eqversion:1.2.2

Trust: 0.6

vendor:sybasemodel:appeonscope:eqversion:3.1

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.4.10

Trust: 0.6

vendor:sunmodel:jdk 06scope:eqversion:1.5

Trust: 0.6

vendor:sunmodel:jre b 007scope:eqversion:1.1.7

Trust: 0.6

vendor:sunmodel:sdk 05scope:eqversion:1.3

Trust: 0.6

vendor:sunmodel:jdk 002scope:eqversion:1.1.8

Trust: 0.6

vendor:sunmodel:jre 008scope:eqversion:1.1.8

Trust: 0.6

vendor:sunmodel:jdk 004scope:eqversion:1.2.2

Trust: 0.6

vendor:redmodel:hat red hat network satellite serverscope:eqversion:5.0

Trust: 0.6

vendor:sunmodel:sdk 12scope:eqversion:1.2.2

Trust: 0.6

vendor:sunmodel:jdk 009scope:eqversion:1.1.6

Trust: 0.6

vendor:sunmodel:jdk 004scope:eqversion:1.2.1

Trust: 0.6

vendor:sunmodel:sdk 013scope:eqversion:1.2.2

Trust: 0.6

vendor:sunmodel:jdk b 007scope:eqversion:1.1.7

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.4.11

Trust: 0.6

vendor:sunmodel:jre 012scope:eqversion:1.2.2

Trust: 0.6

vendor:sunmodel:jre 005scope:eqversion:1.1.8

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.4.11

Trust: 0.6

vendor:sunmodel:jre 009scope:eqversion:1.1.8

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.4.10

Trust: 0.6

vendor:beamodel:systems weblogic expressscope:eqversion:7.0.0.1

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:4.3

Trust: 0.3

vendor:ciscomodel:security agentscope:neversion:5.1.79

Trust: 0.3

vendor:redhatmodel:enterprise linux es ia64scope:eqversion:2.1

Trust: 0.3

vendor:opensslmodel:project openssl gscope:eqversion:0.9.7

Trust: 0.3

vendor:securemodel:computing snapgear sg565scope:eqversion:0

Trust: 0.3

vendor:ciscomodel:ciscoworks common servicesscope:eqversion:2.2

Trust: 0.3

vendor:sshmodel:communications security ssh tectia serverscope:eqversion:4.4.5

Trust: 0.3

vendor:ciscomodel:ons 15454sdhscope:eqversion:4.0(1)

Trust: 0.3

vendor:attachmatemodel:reflection for secure itscope:eqversion:6.1

Trust: 0.3

vendor:s u s emodel:linux professionalscope:eqversion:9.0

Trust: 0.3

vendor:turbolinuxmodel:appliance server hosting editionscope:eqversion:1.0

Trust: 0.3

vendor:netbsdmodel:netbsdscope:eqversion:2.1

Trust: 0.3

vendor:ciscomodel:call managerscope:eqversion:5.1

Trust: 0.3

vendor:ciscomodel:ons optical transport platformscope:eqversion:154543.1.0

Trust: 0.3

vendor:opensslmodel:project openssl b-36.8scope:eqversion:0.9.6

Trust: 0.3

vendor:redhatmodel:enterprise linux extrasscope:eqversion:4

Trust: 0.3

vendor:sybasemodel:eii avaki sdfscope:eqversion:5.0

Trust: 0.3

vendor:sybasemodel:risk analytics platformscope:eqversion:2.9

Trust: 0.3

vendor:beamodel:systems weblogic express spscope:eqversion:7.03

Trust: 0.3

vendor:avayamodel:s8300 cmscope:eqversion:3.1

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.3.2

Trust: 0.3

vendor:sunmodel:java system web server sp2scope:eqversion:6.0

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:5.4

Trust: 0.3

vendor:sshmodel:communications security ssh tectia kscope:neversion:4.3.10

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:6.1

Trust: 0.3

vendor:susemodel:linux enterprise desktopscope:eqversion:10

Trust: 0.3

vendor:ciscomodel:onsscope:neversion:154548.0

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:9.1

Trust: 0.3

vendor:ipcopmodel:ipcopscope:eqversion:1.4.11

Trust: 0.3

vendor:vmwaremodel:workstation buildscope:neversion:6.0.380004

Trust: 0.3

vendor:sybasemodel:easerverscope:eqversion:5.5

Trust: 0.3

vendor:vandykemodel:securecrtscope:eqversion:5.2.2

Trust: 0.3

vendor:ibmmodel:hardware management console for iseriesscope:eqversion:3.3.7

Trust: 0.3

vendor:vmwaremodel:workstation buildscope:eqversion:5.5.334685

Trust: 0.3

vendor:sybasemodel:ffi global fix litescope:eqversion:0

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:5.2

Trust: 0.3

vendor:iscmodel:bind b1scope:eqversion:9.2.7

Trust: 0.3

vendor:ciscomodel:ons 15454sdhscope:eqversion:4.1(0)

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.1.6

Trust: 0.3

vendor:ciscomodel:ons 15454sdhscope:eqversion:4.1(1)

Trust: 0.3

vendor:opensslmodel:project openssl hscope:eqversion:0.9.7

Trust: 0.3

vendor:sybasemodel:unwired orchestratorscope:eqversion:5.1

Trust: 0.3

vendor:hpmodel:openvms secure web serverscope:eqversion:1.2

Trust: 0.3

vendor:sgimodel:propack sp6scope:eqversion:3.0

Trust: 0.3

vendor:opensslmodel:project openssl iscope:eqversion:0.9.7

Trust: 0.3

vendor:sunmodel:java web proxy server sp8scope:eqversion:3.6

Trust: 0.3

vendor:sybasemodel:workspacescope:eqversion:1.6

Trust: 0.3

vendor:openpkgmodel:2-stable-20061018scope: - version: -

Trust: 0.3

vendor:opensslmodel:project openssl bscope:eqversion:0.9.6

Trust: 0.3

vendor:sunmodel:jre bscope:eqversion:1.1.7

Trust: 0.3

vendor:sunmodel:jrescope:eqversion:1.3.1

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:5.3

Trust: 0.3

vendor:beamodel:systems weblogic server spscope:eqversion:8.12

Trust: 0.3

vendor:beamodel:systems weblogic server spscope:eqversion:7.0.0.11

Trust: 0.3

vendor:beamodel:systems weblogic express spscope:eqversion:7.04

Trust: 0.3

vendor:debianmodel:linux mipselscope:eqversion:3.1

Trust: 0.3

vendor:freebsdmodel:-release-p3scope:eqversion:4.11

Trust: 0.3

vendor:beamodel:systems weblogic server for win32 spscope:eqversion:8.12

Trust: 0.3

vendor:vmwaremodel:esx serverscope:eqversion:3.0.1

Trust: 0.3

vendor:beamodel:systems weblogic server for win32 spscope:eqversion:7.0.0.11

Trust: 0.3

vendor:operamodel:software opera web browser win32scope:eqversion:6.0

Trust: 0.3

vendor:s u s emodel:linux professional x86 64scope:eqversion:9.2

Trust: 0.3

vendor:redmodel:hat enterprise linux asscope:eqversion:3

Trust: 0.3

vendor:netbsdmodel:4,0 betascope: - version: -

Trust: 0.3

vendor:sunmodel:jre .0 01scope:eqversion:1.3

Trust: 0.3

vendor:freebsdmodel:-stablepre122300scope:eqversion:4.2

Trust: 0.3

vendor:iscmodel:bind a1scope:eqversion:9.4

Trust: 0.3

vendor:operamodel:software opera web browser 1win32scope:eqversion:7.0

Trust: 0.3

vendor:mandrakesoftmodel:corporate server x86 64scope:eqversion:4.0

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:5.10

Trust: 0.3

vendor:mandrivamodel:linux mandrakescope:eqversion:2006.0

Trust: 0.3

vendor:sunmodel:jdk 09scope:eqversion:1.1.8

Trust: 0.3

vendor:sybasemodel:unwired accelerator and enterprise portalscope:eqversion:7.0

Trust: 0.3

vendor:ciscomodel:mdsscope:eqversion:95000

Trust: 0.3

vendor:netscapemodel:netscapescope:eqversion:6.2.3

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:8.51

Trust: 0.3

vendor:sunmodel:jre 12scope:eqversion:1.1.8

Trust: 0.3

vendor:beamodel:systems weblogic express for win32 spscope:eqversion:8.13

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.8

Trust: 0.3

vendor:sunmodel:sdk 10scope:eqversion:1.2.2

Trust: 0.3

vendor:ciscomodel:ons optical transport platformscope:eqversion:154544.1(0)

Trust: 0.3

vendor:sybasemodel:risk analytics platformscope:eqversion:3.0

Trust: 0.3

vendor:sunmodel:java web proxy serverscope:eqversion:3.6

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:1.5.0.5

Trust: 0.3

vendor:openpkgmodel:openpkgscope:eqversion:2.1

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:4.3.3

Trust: 0.3

vendor:beamodel:systems weblogic express spscope:eqversion:7.0.0.12

Trust: 0.3

vendor:sunmodel:jdk 1.5.0.0 06scope: - version: -

Trust: 0.3

vendor:sunmodel:one application server standard editionscope:eqversion:7.0

Trust: 0.3

vendor:ingatemodel:siparatorscope:neversion:4.5.1

Trust: 0.3

vendor:sunmodel:java system web server sp9scope:eqversion:6.0

Trust: 0.3

vendor:s u s emodel:linux personal ossscope:eqversion:10.0

Trust: 0.3

vendor:sunmodel:sdk 04scope:eqversion:1.3.1

Trust: 0.3

vendor:sshmodel:communications security ssh tectia serverscope:eqversion:4.4.6

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:1.5.0.7

Trust: 0.3

vendor:mandrakesoftmodel:corporate serverscope:eqversion:4.0

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.0.1

Trust: 0.3

vendor:sunmodel:java system web server sp4scope:eqversion:6.1

Trust: 0.3

vendor:redhatmodel:enterprise linux wsscope:eqversion:2.1

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:4.1.3

Trust: 0.3

vendor:ciscomodel:access registrarscope: - version: -

Trust: 0.3

vendor:oraclemodel:http serverscope:eqversion:9.0.1

Trust: 0.3

vendor:sybasemodel:solonde etlscope:eqversion:3.6

Trust: 0.3

vendor:s u s emodel:linux openexchange serverscope: - version: -

Trust: 0.3

vendor:sunmodel:jssescope:eqversion:1.0.2

Trust: 0.3

vendor:sunmodel:one web server sp4scope:eqversion:6.0

Trust: 0.3

vendor:s u s emodel:linux personalscope:eqversion:9.2

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:4.1.1

Trust: 0.3

vendor:beamodel:systems weblogic server spscope:eqversion:7.05

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:7.54

Trust: 0.3

vendor:beamodel:systems weblogic server for win32scope:eqversion:7.0.0.1

Trust: 0.3

vendor:sunmodel:one web server sp7scope:eqversion:6.0

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:7.51

Trust: 0.3

vendor:beamodel:systems weblogic express for win32 spscope:eqversion:7.03

Trust: 0.3

vendor:sunmodel:one web server sp2scope:eqversion:6.0

Trust: 0.3

vendor:beamodel:systems weblogic server for win32 spscope:eqversion:7.05

Trust: 0.3

vendor:iscmodel:bind -p2scope:neversion:9.2.6

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:5.04

Trust: 0.3

vendor:vmwaremodel:workstationscope:eqversion:5.5.4

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.3.1

Trust: 0.3

vendor:sshmodel:communications security ssh tectia serverscope:eqversion:4.1

Trust: 0.3

vendor:sunmodel:java system web server sp2scope:eqversion:6.1

Trust: 0.3

vendor:freebsdmodel:-release-p5scope:eqversion:5.1

Trust: 0.3

vendor:s u s emodel:linux personal x86 64scope:eqversion:9.0

Trust: 0.3

vendor:sybasemodel:eii avaki sdfscope:eqversion:4.0

Trust: 0.3

vendor:gentoomodel:www-client/operascope:eqversion:9.0.2

Trust: 0.3

vendor:ciscomodel:ons 15454sdhscope:eqversion:2.3(5)

Trust: 0.3

vendor:openofficemodel:openofficescope:eqversion:2.3

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:7.10

Trust: 0.3

vendor:avayamodel:converged communications serverscope:eqversion:2.0

Trust: 0.3

vendor:operamodel:software opera web browser win32scope:eqversion:5.12

Trust: 0.3

vendor:ciscomodel:secure acs for windows ntscope:eqversion:2.6.2

Trust: 0.3

vendor:ciscomodel:security agentscope:eqversion:4.5

Trust: 0.3

vendor:opensslmodel:project openssl dscope:eqversion:0.9.6

Trust: 0.3

vendor:beamodel:systems weblogic server spscope:eqversion:7.01

Trust: 0.3

vendor:sybasemodel:rtdsscope:eqversion:2.0.1

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:4.2.2

Trust: 0.3

vendor:ciscomodel:gss global site selectorscope:eqversion:44900

Trust: 0.3

vendor:freebsdmodel:-stablescope:eqversion:6.0

Trust: 0.3

vendor:sshmodel:communications security ssh tectia serverscope:eqversion:4.4.4

Trust: 0.3

vendor:opensslmodel:project openssl beta2scope:eqversion:0.9.7

Trust: 0.3

vendor:ciscomodel:call manager es56scope:eqversion:4.0

Trust: 0.3

vendor:sunmodel:sdk 07scope:eqversion:1.2.2

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:4.10

Trust: 0.3

vendor:beamodel:systems weblogic server spscope:eqversion:7.06

Trust: 0.3

vendor:beamodel:systems weblogic server for win32 spscope:eqversion:7.01

Trust: 0.3

vendor:beamodel:systems weblogic server for win32 spscope:eqversion:7.06

Trust: 0.3

vendor:beamodel:systems weblogic server for win32 spscope:eqversion:7.02

Trust: 0.3

vendor:turbolinuxmodel:personalscope: - version: -

Trust: 0.3

vendor:operamodel:software opera web browser win32scope:eqversion:5.02

Trust: 0.3

vendor:beamodel:systems weblogic express for win32 spscope:eqversion:7.04

Trust: 0.3

vendor:opensslmodel:project openssl escope:eqversion:0.9.7

Trust: 0.3

vendor:freebsdmodel:-release-p32scope:eqversion:4.5

Trust: 0.3

vendor:openofficemodel:openofficescope:eqversion:3.1.1

Trust: 0.3

vendor:sunmodel:jre 007scope:eqversion:1.1.6

Trust: 0.3

vendor:sybasemodel:sdkscope:eqversion:12.5.1

Trust: 0.3

vendor:opensslmodel:project openssl fscope:eqversion:0.9.6

Trust: 0.3

vendor:ciscomodel:security agentscope:eqversion:5.1

Trust: 0.3

vendor:opensslmodel:project opensslscope:eqversion:0.9.7

Trust: 0.3

vendor:sunmodel:jre 01ascope:eqversion:1.3.1

Trust: 0.3

vendor:ciscomodel:works common servicesscope:eqversion:2.2

Trust: 0.3

vendor:attachmatemodel:reflection ftp clientscope:eqversion:12.0

Trust: 0.3

vendor:ciscomodel:secure acs for windows ntscope:eqversion:2.1

Trust: 0.3

vendor:vmwaremodel:esx serverscope:eqversion:2.5.3

Trust: 0.3

vendor:ciscomodel:unified presence serverscope:eqversion:1.0

Trust: 0.3

vendor:sybasemodel:ffi global fixscope:eqversion:0

Trust: 0.3

vendor:sshmodel:communications security ssh tectiascope:neversion:5.1.1

Trust: 0.3

vendor:ubuntumodel:linux lts sparcscope:eqversion:6.06

Trust: 0.3

vendor:ciscomodel:call manager es33scope:eqversion:4.1

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:4.3.1

Trust: 0.3

vendor:sybasemodel:easerverscope:eqversion:6.0

Trust: 0.3

vendor:ciscomodel:ons 15454sdhscope:eqversion:3.1

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:10.2

Trust: 0.3

vendor:vmwaremodel:workstationscope:eqversion:5.5.5

Trust: 0.3

vendor:s u s emodel:linux professionalscope:eqversion:9.1

Trust: 0.3

vendor:ciscomodel:call managerscope:eqversion:4.0

Trust: 0.3

vendor:freebsdmodel:-prereleasescope:eqversion:5.4

Trust: 0.3

vendor:sunmodel:jre 07scope:eqversion:1.4.1

Trust: 0.3

vendor:openvpnmodel:beta11scope:eqversion:2.0

Trust: 0.3

vendor:sybasemodel:rtdsscope:eqversion:3.1

Trust: 0.3

vendor:sunmodel:jsse 01scope:eqversion:1.0.3

Trust: 0.3

vendor:oraclemodel:http serverscope:eqversion:1.0.2.1

Trust: 0.3

vendor:sunmodel:java system web server sp8scope:eqversion:6.0

Trust: 0.3

vendor:sunmodel:java system application server 2004q2scope:eqversion:7.0

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:4.3.2

Trust: 0.3

vendor:iscmodel:bind bscope:eqversion:9.3.3

Trust: 0.3

vendor:vmwaremodel:workstationscope:eqversion:6.0.1

Trust: 0.3

vendor:openvpnmodel:openvpnscope:eqversion:2.0.3

Trust: 0.3

vendor:vmwaremodel:workstation buildscope:eqversion:5.5.444386

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.1.3.132

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:4.3.1

Trust: 0.3

vendor:sunmodel:java web proxy server sp3scope:eqversion:3.6

Trust: 0.3

vendor:sunmodel:jre 009scope:eqversion:1.1.6

Trust: 0.3

vendor:sshmodel:communications security ssh tectiascope:eqversion:2.1.3

Trust: 0.3

vendor:ciscomodel:secure acs for windows ntscope:eqversion:2.5

Trust: 0.3

vendor:beamodel:systems weblogic server for win32scope:eqversion:8.1

Trust: 0.3

vendor:sshmodel:communications security ssh tectia serverscope:eqversion:4.4

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.2

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:8.52

Trust: 0.3

vendor:netbsdmodel:netbsdscope:eqversion:3.0.2

Trust: 0.3

vendor:sunmodel:jre b 005scope:eqversion:1.1.7

Trust: 0.3

vendor:ciscomodel:security agentscope:eqversion:4.5.1.639

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.1.5

Trust: 0.3

vendor:redmodel:hat enterprise linux asscope:eqversion:2.1

Trust: 0.3

vendor:redhatmodel:desktopscope:eqversion:4.0

Trust: 0.3

vendor:debianmodel:linux hppascope:eqversion:3.1

Trust: 0.3

vendor:vmwaremodel:workstation buildscope:eqversion:5.5.342958

Trust: 0.3

vendor:sunmodel:jsse 02scope:eqversion:1.0.3

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.0

Trust: 0.3

vendor:ciscomodel:application & content networking softwarescope: - version: -

Trust: 0.3

vendor:sshmodel:communications security ssh tectia serverscope:eqversion:4.4.2

Trust: 0.3

vendor:redhatmodel:enterprise linux esscope:eqversion:3

Trust: 0.3

vendor:sunmodel:jre 11scope:eqversion:1.2.2

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:4.8

Trust: 0.3

vendor:attachmatemodel:reflectionscope:eqversion:8.0

Trust: 0.3

vendor:ciscomodel:security agentscope:eqversion:4.0.3.728

Trust: 0.3

vendor:ciscomodel:call managerscope:eqversion:4.3(1)

Trust: 0.3

vendor:ciscomodel:ciscoworks common management foundationscope:eqversion:2.1

Trust: 0.3

vendor:openvpnmodel:openvpnscope:neversion:2.0.8

Trust: 0.3

vendor:novellmodel:international cryptographic infrastructurescope:neversion:2.7.2

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:4.7

Trust: 0.3

vendor:sybasemodel:risk analytics platformscope:eqversion:2.0

Trust: 0.3

vendor:sybasemodel:rtdsscope:eqversion:4.0

Trust: 0.3

vendor:ciscomodel:ons optical transport platformscope:eqversion:154544.1

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:8.54

Trust: 0.3

vendor:operamodel:software opera web browser betascope:eqversion:83

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:3.3.1

Trust: 0.3

vendor:s u s emodel:linux professional x86 64scope:eqversion:9.1

Trust: 0.3

vendor:beamodel:systems weblogic express for win32scope:eqversion:7.0.0.1

Trust: 0.3

vendor:securemodel:computing snapgear u2scope:neversion:3.1.4

Trust: 0.3

vendor:beamodel:systems weblogic express spscope:eqversion:7.07

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:7.53

Trust: 0.3

vendor:openofficemodel:openofficescope:eqversion:2.4

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:4.1.1

Trust: 0.3

vendor:beamodel:systems weblogic serverscope:eqversion:7.0

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:7.21

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:3.2

Trust: 0.3

vendor:sunmodel:java system web server sp5scope:eqversion:6.0

Trust: 0.3

vendor:securemodel:computing snapgear sg580scope:eqversion:0

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.1.4

Trust: 0.3

vendor:ciscomodel:ons 15454e optical transport platformscope:eqversion:0

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.1.1

Trust: 0.3

vendor:sybasemodel:data auditingscope:eqversion:4.5.3

Trust: 0.3

vendor:openofficemodel:openofficescope:neversion:3.2

Trust: 0.3

vendor:vmwaremodel:playerscope:eqversion:1.0.5

Trust: 0.3

vendor:sybasemodel:afariascope:eqversion:5.0

Trust: 0.3

vendor:beamodel:systems weblogic express for win32 spscope:eqversion:8.11

Trust: 0.3

vendor:freebsdmodel:-release-p42scope:eqversion:4.4

Trust: 0.3

vendor:ciscomodel:ons mstpscope:eqversion:154540

Trust: 0.3

vendor:arkoonmodel:ssl360scope:neversion:2.0/3

Trust: 0.3

vendor:sunmodel:java system application server 2004q2 r1standardscope:eqversion:7.0

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:1.0.5

Trust: 0.3

vendor:ibmmodel:hardware management console for pseriesscope:eqversion:3.3.7

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:4.4

Trust: 0.3

vendor:sshmodel:communications security ssh tectia server for ibm z/osscope:eqversion:5.1

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:4.11

Trust: 0.3

vendor:sybasemodel:easerverscope:eqversion:5.2

Trust: 0.3

vendor:openvpnmodel:openvpnscope:eqversion:2.0.5

Trust: 0.3

vendor:ciscomodel:secure acs solution enginescope: - version: -

Trust: 0.3

vendor:openofficemodel:openofficescope:eqversion:2.2

Trust: 0.3

vendor:ciscomodel:ons optical transport platformscope:eqversion:154544.6(0)

Trust: 0.3

vendor:opensslmodel:project openssl bscope:eqversion:0.9.8

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:8.0

Trust: 0.3

vendor:sybasemodel:unwired orchestratorscope:eqversion:4.3

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.1.2

Trust: 0.3

vendor:sybasemodel:data direct odbc/ole-db drivers for asescope:eqversion:0

Trust: 0.3

vendor:sunmodel:java system web server sp3scope:eqversion:6.0

Trust: 0.3

vendor:avayamodel:s8500 r2.0.1scope: - version: -

Trust: 0.3

vendor:ibmmodel:hardware management console for pseries r1.0scope:eqversion:5.0

Trust: 0.3

vendor:sshmodel:communications security tectiascope:eqversion:2.0

Trust: 0.3

vendor:iscmodel:bind a5scope:eqversion:9.4

Trust: 0.3

vendor:sybasemodel:global fix litescope:eqversion:0

Trust: 0.3

vendor:sybasemodel:easerverscope:eqversion:5.3

Trust: 0.3

vendor:operamodel:software opera web browser win32 betascope:eqversion:7.01

Trust: 0.3

vendor:sshmodel:communications security ssh tectia managerscope:eqversion:2.1.3

Trust: 0.3

vendor:s u s emodel:linux personalscope:eqversion:9.1

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:4.6.2

Trust: 0.3

vendor:ciscomodel:ons optical transport platformscope:eqversion:154544.1(1)

Trust: 0.3

vendor:ciscomodel:works common servicesscope:eqversion:3.0

Trust: 0.3

vendor:ciscomodel:ons optical transport platformscope:eqversion:154544.6(1)

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:4.8

Trust: 0.3

vendor:operamodel:software opera web browser linuxscope:eqversion:6.0.1

Trust: 0.3

vendor:iscmodel:bind -p1scope:eqversion:9.2.6

Trust: 0.3

vendor:netscapemodel:netscapescope:eqversion:7.1

Trust: 0.3

vendor:sshmodel:communications security ssh tectia serverscope:neversion:4.4.7

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:7.22

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:4.2.1

Trust: 0.3

vendor:ibmmodel:hardware management console for iseries r5.0scope:eqversion:4.0

Trust: 0.3

vendor:ciscomodel:wide area application servicesscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:secure acs solution enginescope:eqversion:3.3.1

Trust: 0.3

vendor:ciscomodel:security agentscope:eqversion:4.0

Trust: 0.3

vendor:openofficemodel:openofficescope:eqversion:2.0.4

Trust: 0.3

vendor:hpmodel:virtualvault a.04.50scope: - version: -

Trust: 0.3

vendor:sunmodel:jdk 14scope:eqversion:1.1.8

Trust: 0.3

vendor:avayamodel:integrated managementscope: - version: -

Trust: 0.3

vendor:sunmodel:secure global desktopscope:eqversion:4.2

Trust: 0.3

vendor:ciscomodel:ons optical transport platformscope:eqversion:154544.14

Trust: 0.3

vendor:opensslmodel:project openssl gscope:eqversion:0.9.6

Trust: 0.3

vendor:iscmodel:bind a4scope:eqversion:9.4

Trust: 0.3

vendor:securemodel:computing snapgear sg560scope:eqversion:0

Trust: 0.3

vendor:s u s emodel:suse linux school server for i386scope: - version: -

Trust: 0.3

vendor:sshmodel:communications security ssh tectia connectorscope:eqversion:5.0.1

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:4.5

Trust: 0.3

vendor:openpkgmodel:currentscope: - version: -

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:4.2

Trust: 0.3

vendor:sunmodel:jre 10scope:eqversion:1.1.8

Trust: 0.3

vendor:sybasemodel:rtdsscope:eqversion:2.0

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:4.3.4

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:4.3

Trust: 0.3

vendor:sunmodel:one web serverscope:eqversion:6.0

Trust: 0.3

vendor:iscmodel:bind rc2scope:eqversion:9.2.7

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.0

Trust: 0.3

vendor:beamodel:systems weblogic express for win32scope:eqversion:8.1

Trust: 0.3

vendor:sshmodel:communications security ssh tectia managerscope:neversion:2.2.1

Trust: 0.3

vendor:sybasemodel:rtdsscope:eqversion:3.5

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:5.1

Trust: 0.3

vendor:ciscomodel:secure acs for windows ntscope:eqversion:2.3

Trust: 0.3

vendor:beamodel:systems weblogic express for win32 spscope:eqversion:7.07

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:5.2.1

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:4.11

Trust: 0.3

vendor:ciscomodel:call manager es07scope:eqversion:4.1

Trust: 0.3

vendor:beamodel:systems weblogic server spscope:eqversion:7.04

Trust: 0.3

vendor:sshmodel:communications security ssh tectia serverscope:eqversion:4.4.1

Trust: 0.3

vendor:sunmodel:jdk 1.5.0.0 04scope: - version: -

Trust: 0.3

vendor:sunmodel:java system web server sp5scope:eqversion:6.1

Trust: 0.3

vendor:sybasemodel:workspacescope:eqversion:1.5

Trust: 0.3

vendor:s u s emodel:tomboyscope:eqversion:9.3

Trust: 0.3

vendor:ibmmodel:hardware management console for iseries r1.0scope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux ia-64scope:eqversion:3.1

Trust: 0.3

vendor:sunmodel:one application server platform editionscope:eqversion:7.0

Trust: 0.3

vendor:redhatmodel:enterprise linux wsscope:eqversion:4

Trust: 0.3

vendor:attachmatemodel:reflectionscope:eqversion:x0

Trust: 0.3

vendor:opensslmodel:project openssl hscope:eqversion:0.9.6

Trust: 0.3

vendor:freebsdmodel:-stablescope:eqversion:5.5

Trust: 0.3

vendor:sybasemodel:ecdascope:eqversion:12.6

Trust: 0.3

vendor:sshmodel:communications security ssh tectia managerscope:eqversion:2.2

Trust: 0.3

vendor:operamodel:software opera web browser jscope:eqversion:7.11

Trust: 0.3

vendor:opensslmodel:project openssl ascope:eqversion:0.9.5

Trust: 0.3

vendor:opensslmodel:project openssl iscope:eqversion:0.9.6

Trust: 0.3

vendor:ciscomodel:security agentscope:eqversion:4.5.1

Trust: 0.3

vendor:iscmodel:bind rc2scope:eqversion:9.3.3

Trust: 0.3

vendor:ciscomodel:secure acs for windows ntscope:eqversion:3.0.1

Trust: 0.3

vendor:ciscomodel:secure acs for windows ntscope:eqversion:3.1.1

Trust: 0.3

vendor:openvpnmodel:openvpnscope:eqversion:2.0.4

Trust: 0.3

vendor:mandrakesoftmodel:corporate server x86 64scope:eqversion:3.0

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.1.2

Trust: 0.3

vendor:ciscomodel:ons 15454sdhscope:eqversion:3.4

Trust: 0.3

vendor:sybasemodel:appeonscope:eqversion:5.0

Trust: 0.3

vendor:sunmodel:solaris 8 x86scope: - version: -

Trust: 0.3

vendor:redhatmodel:enterprise linux esscope:eqversion:2.1

Trust: 0.3

vendor:openofficemodel:openofficescope:eqversion:2.0.1

Trust: 0.3

vendor:sunmodel:one web server sp9scope:eqversion:6.0

Trust: 0.3

vendor:ciscomodel:secure acs solution enginescope:eqversion:3.3

Trust: 0.3

vendor:sshmodel:communications security ssh tectia connectorscope:neversion:5.0.3

Trust: 0.3

vendor:ciscomodel:secure acs for unixscope:eqversion:2.3

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:4.7

Trust: 0.3

vendor:netbsdmodel:netbsdscope:eqversion:2.0.4

Trust: 0.3

vendor:opensslmodel:project openssl cscope:eqversion:0.9.6

Trust: 0.3

vendor:beamodel:systems weblogic server spscope:eqversion:7.0.0.12

Trust: 0.3

vendor:ciscomodel:secure acs for windows ntscope:eqversion:2.42

Trust: 0.3

vendor:sshmodel:communications security ssh tectia serverscope:eqversion:4.2

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.1

Trust: 0.3

vendor:oraclemodel:http serverscope:eqversion:9.0.2

Trust: 0.3

vendor:beamodel:systems weblogic server for win32 spscope:eqversion:7.0.0.12

Trust: 0.3

vendor:oraclemodel:http serverscope:eqversion:9.1

Trust: 0.3

vendor:debianmodel:linux amd64scope:eqversion:3.1

Trust: 0.3

vendor:ciscomodel:call manager es50scope:eqversion:4.1

Trust: 0.3

vendor:opensslmodel:project opensslscope:eqversion:0.9.3

Trust: 0.3

vendor:oraclemodel:http serverscope:eqversion:8.1.7

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:8.50

Trust: 0.3

vendor:opensslmodel:project openssl cscope:eqversion:0.9.1

Trust: 0.3

vendor:sybasemodel:workspacescope:eqversion:1.0

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:5.04

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:4.5

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:5.0

Trust: 0.3

vendor:mandrakesoftmodel:corporate serverscope:eqversion:3.0

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:6.06

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:6.0.1

Trust: 0.3

vendor:openpkgmodel:openpkgscope:eqversion:2.4

Trust: 0.3

vendor:sybasemodel:ecdascope:eqversion:12.5

Trust: 0.3

vendor:sunmodel:jre 07scope:eqversion:1.2.2

Trust: 0.3

vendor:avayamodel:s8500 r2.0.0scope: - version: -

Trust: 0.3

vendor:avayamodel:s8700 r2.0.0scope: - version: -

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.2.1

Trust: 0.3

vendor:sunmodel:sdk 05ascope:eqversion:1.2.2

Trust: 0.3

vendor:beamodel:systems weblogic server for win32scope:eqversion:9.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.9

Trust: 0.3

vendor:operamodel:software opera web browser linuxscope:eqversion:6.0.3

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:5.1

Trust: 0.3

vendor:sunmodel:java web proxy server sp4scope:eqversion:3.6

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:4.3.3

Trust: 0.3

vendor:opensslmodel:project openssl ascope:eqversion:0.9.8

Trust: 0.3

vendor:redmodel:hat network satellite (for rhelscope:eqversion:3)4.2

Trust: 0.3

vendor:vmwaremodel:serverscope:eqversion:1.0.3

Trust: 0.3

vendor:sybasemodel:eii avaki sdfscope:eqversion:3.0

Trust: 0.3

vendor:ciscomodel:ons optical transport platformscope:eqversion:154544.1(2)

Trust: 0.3

vendor:openofficemodel:openofficescope:eqversion:3.1

Trust: 0.3

vendor:openpkgmodel:openpkgscope:eqversion:2.2

Trust: 0.3

vendor:operamodel:software opera web browser beta buildscope:eqversion:7.2012981

Trust: 0.3

vendor:opensslmodel:project openssl cscope:eqversion:0.9.7

Trust: 0.3

vendor:freebsdmodel:-release-p20scope:eqversion:4.11

Trust: 0.3

vendor:ciscomodel:security agentscope:eqversion:4.0.3

Trust: 0.3

vendor:oraclemodel:http serverscope:eqversion:9.2.8

Trust: 0.3

vendor:iscmodel:bind b1scope:eqversion:9.3.3

Trust: 0.3

vendor:trustixmodel:secure linuxscope:eqversion:2.2

Trust: 0.3

vendor:ciscomodel:security marsscope:eqversion:4.2.2

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9

Trust: 0.3

vendor:sybasemodel:eii avaki sdfscope:eqversion:6.2

Trust: 0.3

vendor:opensslmodel:project openssl lscope:eqversion:0.9.6

Trust: 0.3

vendor:openvpnmodel:openvpnscope:eqversion:2.0.1

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:4.6

Trust: 0.3

vendor:sunmodel:sdk 003scope:eqversion:1.2.1

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:8.53

Trust: 0.3

vendor:attachmatemodel:reflection sp1scope:neversion:14.0

Trust: 0.3

vendor:oraclemodel:http serverscope:eqversion:9.0.2.3

Trust: 0.3

vendor:sunmodel:sdkscope:eqversion:1.2.2

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:4.4.1

Trust: 0.3

vendor:sunmodel:java system web serverscope:eqversion:6.1

Trust: 0.3

vendor:netbsdmodel:netbsdscope:eqversion:2.0.1

Trust: 0.3

vendor:sybasemodel:rfid enterprisescope:eqversion:2.0

Trust: 0.3

vendor:netbsdmodel:current pre20010701scope: - version: -

Trust: 0.3

vendor:beamodel:systems weblogic server spscope:eqversion:8.15

Trust: 0.3

vendor:turbolinuxmodel:f...scope:eqversion:10

Trust: 0.3

vendor:ciscomodel:ons optical transport platformscope:eqversion:154543.0

Trust: 0.3

vendor:sunmodel:jdk bscope:eqversion:1.1.7

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.2.6

Trust: 0.3

vendor:beamodel:systems weblogic server for win32 spscope:eqversion:8.15

Trust: 0.3

vendor:freebsdmodel:-release-p38scope:eqversion:4.3

Trust: 0.3

vendor:hpmodel:hp-ux b.11.00scope: - version: -

Trust: 0.3

vendor:hpmodel:hp-ux b.11.31scope: - version: -

Trust: 0.3

vendor:s u s emodel:linux personal x86 64scope:eqversion:9.2

Trust: 0.3

vendor:opensslmodel:project openssl escope:eqversion:0.9.6

Trust: 0.3

vendor:beamodel:systems weblogic server spscope:eqversion:8.14

Trust: 0.3

vendor:beamodel:systems weblogic express spscope:eqversion:7.0.0.13

Trust: 0.3

vendor:ciscomodel:ciscoworks common management foundationscope:eqversion:0

Trust: 0.3

vendor:sybasemodel:corp bankingscope:eqversion:0

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.2.4

Trust: 0.3

vendor:opensslmodel:project opensslscope:eqversion:0.9.6

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:4.2.2

Trust: 0.3

vendor:beamodel:systems weblogic server for win32 spscope:eqversion:8.14

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:5.0

Trust: 0.3

vendor:sunmodel:java system application server enterprise editionscope:eqversion:7.0

Trust: 0.3

vendor:redmodel:hat enterprise linux asscope:eqversion:4

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:4.2

Trust: 0.3

vendor:ciscomodel:secure acs for windows ntscope:eqversion:2.4

Trust: 0.3

vendor:debianmodel:linux s/390scope:eqversion:3.1

Trust: 0.3

vendor:s u s emodel:tomboyscope:eqversion:10.0

Trust: 0.3

vendor:mandrivamodel:linux mandrake x86 64scope:eqversion:2007.0

Trust: 0.3

vendor:ciscomodel:secure acs for unixscope:eqversion:2.3.5.1

Trust: 0.3

vendor:susemodel:linux enterprise serverscope:eqversion:10

Trust: 0.3

vendor:vmwaremodel:esx serverscope:eqversion:2.1.3

Trust: 0.3

vendor:openofficemodel:openofficescope:eqversion:2.2.1

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:10.0

Trust: 0.3

vendor:sshmodel:communications security ssh tectia server for ibm z/osscope:neversion:5.1.1

Trust: 0.3

vendor:ubuntumodel:linux lts powerpcscope:eqversion:6.06

Trust: 0.3

vendor:opensslmodel:project openssl beta3scope:eqversion:0.9.7

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:6.10

Trust: 0.3

vendor:vmwaremodel:esx serverscope:eqversion:2.0.2

Trust: 0.3

vendor:sshmodel:communications security ssh tectia kscope:eqversion:4.3.9

Trust: 0.3

vendor:sunmodel:one web server sp8scope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux sparcscope:eqversion:3.1

Trust: 0.3

vendor:beamodel:systems weblogic express spscope:eqversion:8.12

Trust: 0.3

vendor:operamodel:software opera web browser linuxscope:eqversion:6.10

Trust: 0.3

vendor:beamodel:systems weblogic express spscope:eqversion:7.0.0.11

Trust: 0.3

vendor:freebsdmodel:-stablescope:eqversion:4.4

Trust: 0.3

vendor:redmodel:hat red hat network satellite serverscope:eqversion:4.2

Trust: 0.3

vendor:operamodel:software opera web browser win32scope:eqversion:6.0.5

Trust: 0.3

vendor:sunmodel:java system application server 2004q2 r1enterprisescope:eqversion:7.0

Trust: 0.3

vendor:ubuntumodel:linux sparcscope:eqversion:6.10

Trust: 0.3

vendor:freebsdmodel:5.4-stablescope: - version: -

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:4.0

Trust: 0.3

vendor:iscmodel:bind a6scope:eqversion:9.4

Trust: 0.3

vendor:vmwaremodel:playerscope:eqversion:1.0.3

Trust: 0.3

vendor:sunmodel:jdk 02scope:eqversion:1.4.2

Trust: 0.3

vendor:avayamodel:message networkingscope: - version: -

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:4.9

Trust: 0.3

vendor:sshmodel:communications security ssh tectiascope:eqversion:2.1.2

Trust: 0.3

vendor:ciscomodel:ons 15454sdhscope:eqversion:4.0(0)

Trust: 0.3

vendor:turbolinuxmodel:serverscope:eqversion:8.0

Trust: 0.3

vendor:freebsdmodel:-release-p8scope:eqversion:4.10

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:1.0.3

Trust: 0.3

vendor:redhatmodel:desktopscope:eqversion:3.0

Trust: 0.3

vendor:sshmodel:communications security ssh tectia jscope:eqversion:4.3.1

Trust: 0.3

vendor:freebsdmodel:-release-p17scope:eqversion:4.7

Trust: 0.3

vendor:trustixmodel:secure enterprise linuxscope:eqversion:2.0

Trust: 0.3

vendor:sybasemodel:rfid enterprisescope:eqversion:2.2

Trust: 0.3

vendor:ciscomodel:call manager es24scope:eqversion:4.1

Trust: 0.3

vendor:sybasemodel:powerbuilderscope:eqversion:9.0

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:4.3.2

Trust: 0.3

vendor:attachmatemodel:reflectionscope:eqversion:14.0

Trust: 0.3

vendor:attachmatemodel:reflectionscope:eqversion:13.0.4

Trust: 0.3

vendor:ciscomodel:gss global site selectorscope:eqversion:44910

Trust: 0.3

vendor:avayamodel:s8300 r2.0.1scope: - version: -

Trust: 0.3

vendor:operamodel:software opera web browser .6win32scope:eqversion:6.0

Trust: 0.3

vendor:sunmodel:sdk 02scope:eqversion:1.4.2

Trust: 0.3

vendor:sunmodel:sdk 11scope:eqversion:1.2.2

Trust: 0.3

vendor:freebsdmodel:-prereleasescope:eqversion:4.8

Trust: 0.3

vendor:beamodel:systems weblogic express spscope:eqversion:8.11

Trust: 0.3

vendor:hpmodel:openvms secure web serverscope:eqversion:1.1-1

Trust: 0.3

vendor:sybasemodel:data integration suite discope:eqversion:1.0

Trust: 0.3

vendor:susemodel:linux enterprise sdkscope:eqversion:10

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:3.2.1

Trust: 0.3

vendor:attachmatemodel:reflectionscope:eqversion:13.0

Trust: 0.3

vendor:sybasemodel:rtdsscope:eqversion:3.0

Trust: 0.3

vendor:beamodel:systems weblogic server spscope:eqversion:7.0.0.14

Trust: 0.3

vendor:sunmodel:java web proxy server sp7scope:eqversion:3.6

Trust: 0.3

vendor:beamodel:systems weblogic serverscope:eqversion:9.0

Trust: 0.3

vendor:sunmodel:java system application server platform edition q1 ur1scope:eqversion:8.12005

Trust: 0.3

vendor:sybasemodel:data auditingscope:eqversion:4.5.2

Trust: 0.3

vendor:sshmodel:communications security ssh tectia jscope:neversion:4.3.3

Trust: 0.3

vendor:beamodel:systems weblogic express spscope:eqversion:7.05

Trust: 0.3

vendor:openbsdmodel:openbsdscope:eqversion:3.9

Trust: 0.3

vendor:freebsdmodel:-stablescope:eqversion:4.3

Trust: 0.3

vendor:attachmatemodel:reflection for secure it sp1scope:neversion:6.1

Trust: 0.3

vendor:sshmodel:communications security ssh tectiascope:eqversion:1.4

Trust: 0.3

vendor:sshmodel:communications security ssh tectia connectorscope:eqversion:5.0.2

Trust: 0.3

vendor:openpkgmodel:stablescope: - version: -

Trust: 0.3

vendor:sunmodel:java system web server sp10scope:eqversion:6.0

Trust: 0.3

vendor:sunmodel:sdk 14scope:eqversion:1.2.2

Trust: 0.3

vendor:freebsdmodel:4.10-prereleasescope: - version: -

Trust: 0.3

vendor:sunmodel:java enterprise system 2005q1scope: - version: -

Trust: 0.3

vendor:sunmodel:sdk 01scope:eqversion:1.4.2

Trust: 0.3

vendor:attachmatemodel:reflection sftp clientscope:eqversion:6.0

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:6.10

Trust: 0.3

vendor:sshmodel:communications security ssh tectiascope:eqversion:2.0

Trust: 0.3

vendor:sunmodel:solaris 8 sparcscope: - version: -

Trust: 0.3

vendor:sybasemodel:afariascope:eqversion:5.1

Trust: 0.3

vendor:avayamodel:s8700 cmscope:eqversion:3.1

Trust: 0.3

vendor:s u s emodel:linux professional ossscope:eqversion:10.0

Trust: 0.3

vendor:mandrivamodel:linux mandrakescope:eqversion:2007.0

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:4.0

Trust: 0.3

vendor:susemodel:linux enterprise serverscope:eqversion:8

Trust: 0.3

vendor:hpmodel:system management homepagescope:neversion:2.1.9

Trust: 0.3

vendor:openofficemodel:openofficescope:eqversion:2.0.2

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:4.2.3

Trust: 0.3

vendor:s u s emodel:linux professional x86 64scope:eqversion:9.3

Trust: 0.3

vendor:trustixmodel:secure linuxscope:eqversion:3.0

Trust: 0.3

vendor:beamodel:systems weblogic express spscope:eqversion:7.02

Trust: 0.3

vendor:turbolinuxmodel:appliance server workgroup editionscope:eqversion:1.0

Trust: 0.3

vendor:sunmodel:java system application server platform edition q1scope:eqversion:8.12005

Trust: 0.3

vendor:vmwaremodel:player buildscope:neversion:1.0.680404

Trust: 0.3

vendor:avayamodel:s8710 cmscope:eqversion:3.1

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:4.9

Trust: 0.3

vendor:freebsdmodel:-stablescope:eqversion:4.7

Trust: 0.3

vendor:sybasemodel:iq extended enterpirse editionscope:eqversion:12.7

Trust: 0.3

vendor:beamodel:systems weblogic expressscope:eqversion:7.0

Trust: 0.3

vendor:sunmodel:jdk 13scope:eqversion:1.1.8

Trust: 0.3

vendor:beamodel:systems weblogic express for win32 spscope:eqversion:8.12

Trust: 0.3

vendor:beamodel:systems weblogic express for win32 spscope:eqversion:7.0.0.11

Trust: 0.3

vendor:sunmodel:java system application server standard 2004q2 r5scope:eqversion:7.0.0

Trust: 0.3

vendor:ciscomodel:ons optical transport platformscope:eqversion:154543.2.0

Trust: 0.3

vendor:iscmodel:bind rc3scope:neversion:9.2.7

Trust: 0.3

vendor:freebsdmodel:-stablescope:eqversion:6.1

Trust: 0.3

vendor:sunmodel:sdk 07ascope:eqversion:1.2.2

Trust: 0.3

vendor:ciscomodel:call manager es32scope:eqversion:4.1

Trust: 0.3

vendor:avayamodel:interactive responsescope: - version: -

Trust: 0.3

vendor:ciscomodel:call managerscope:eqversion:3.3

Trust: 0.3

vendor:freebsdmodel:-release-p20scope:eqversion:4.6

Trust: 0.3

vendor:sybasemodel:unwired accelerator and enterprise portalscope:eqversion:6.0

Trust: 0.3

vendor:ciscomodel:security agentscope:eqversion:4.0.2

Trust: 0.3

vendor:ciscomodel:secure acs for windows ntscope:eqversion:2.6

Trust: 0.3

vendor:openofficemodel:openofficescope:eqversion:2.4.1

Trust: 0.3

vendor:operamodel:software opera web browser macscope:eqversion:5.0

Trust: 0.3

vendor:sybasemodel:eii avaki sdfscope:eqversion:6.1

Trust: 0.3

vendor:sunmodel:java system application server enterprise edition 2005q1rhel2.1/rhel3scope:eqversion:8.1

Trust: 0.3

vendor:sshmodel:communications security ssh tectia managerscope:eqversion:2.1.2

Trust: 0.3

vendor:ciscomodel:secure acs for windows ntscope:eqversion:2.6.3

Trust: 0.3

vendor:novellmodel:international cryptographic infostructurescope:eqversion:2.6.1

Trust: 0.3

vendor:sshmodel:communications security ssh tectia kscope:eqversion:4.3.8

Trust: 0.3

vendor:debianmodel:linux ppcscope:eqversion:3.1

Trust: 0.3

vendor:opensslmodel:project openssl ascope:eqversion:0.9.7

Trust: 0.3

vendor:ciscomodel:ons optical transport platformscope:eqversion:154544.1(3)

Trust: 0.3

vendor:mandrakesoftmodel:multi network firewallscope:eqversion:2.0

Trust: 0.3

vendor:operamodel:software opera web browser bscope:eqversion:7.11

Trust: 0.3

vendor:vmwaremodel:workstation buildscope:neversion:5.5.680404

Trust: 0.3

vendor:freebsdmodel:-stablescope:eqversion:5.3

Trust: 0.3

vendor:opensslmodel:project openssl kscope:neversion:0.9.7

Trust: 0.3

vendor:sshmodel:communications security ssh tectia connectorscope:eqversion:5.0

Trust: 0.3

vendor:iscmodel:bind rc1scope:eqversion:9.2.7

Trust: 0.3

vendor:sunmodel:java system application server standard 2004q2 r4scope:eqversion:7.0.0

Trust: 0.3

vendor:rpathmodel:linuxscope:eqversion:1

Trust: 0.3

vendor:iscmodel:bind rc3scope:neversion:9.3.3

Trust: 0.3

vendor:ciscomodel:call manager sr2scope:eqversion:4.1

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9.01

Trust: 0.3

vendor:s u s emodel:linux personalscope:eqversion:9.3

Trust: 0.3

vendor:ciscomodel:call manager sr2bscope:eqversion:4.0

Trust: 0.3

vendor:turbolinuxmodel:serverscope:eqversion:7.0

Trust: 0.3

vendor:sunmodel:java system application server 2004q2 r2 enterprisescope:eqversion:7.0

Trust: 0.3

vendor:sunmodel:java system web server sp6scope:eqversion:6.0

Trust: 0.3

vendor:netbsdmodel:current augustscope:eqversion:232006

Trust: 0.3

vendor:ciscomodel:ons 15454sdhscope:eqversion:4.6(0)

Trust: 0.3

vendor:ubuntumodel:linux lts i386scope:eqversion:6.06

Trust: 0.3

vendor:avayamodel:messaging storage serverscope: - version: -

Trust: 0.3

vendor:sunmodel:jre 05ascope:eqversion:1.2.2

Trust: 0.3

vendor:redhatmodel:enterprise linux esscope:eqversion:4

Trust: 0.3

vendor:openvpnmodel:openvpnscope:eqversion:2.0.2

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.2.2

Trust: 0.3

vendor:sunmodel:sdk 007scope:eqversion:1.1.8

Trust: 0.3

vendor:operamodel:software opera web browser win32scope:eqversion:7.0

Trust: 0.3

vendor:beamodel:systems weblogic express for win32 spscope:eqversion:7.05

Trust: 0.3

vendor:sunmodel:one web server sp3scope:eqversion:6.0

Trust: 0.3

vendor:avayamodel:intuity lxscope: - version: -

Trust: 0.3

vendor:operamodel:software opera web browser win32scope:eqversion:6.0.1

Trust: 0.3

vendor:netbsdmodel:netbsdscope:eqversion:2.0

Trust: 0.3

vendor:ciscomodel:secure acs for windows ntscope:eqversion:3.1

Trust: 0.3

vendor:beamodel:systems weblogic server spscope:eqversion:8.13

Trust: 0.3

vendor:s u s emodel:linux personal x86 64scope:eqversion:9.1

Trust: 0.3

vendor:ciscomodel:security agentscope:eqversion:3.x

Trust: 0.3

vendor:ciscomodel:ons optical transport platformscope:eqversion:154544.0(1)

Trust: 0.3

vendor:netbsdmodel:netbsdscope:eqversion:2.0.2

Trust: 0.3

vendor:attachmatemodel:reflection for secure itscope:eqversion:6.0

Trust: 0.3

vendor:sunmodel:jre 003scope:eqversion:1.2.2

Trust: 0.3

vendor:openofficemodel:openofficescope:eqversion:2.4.3

Trust: 0.3

vendor:sunmodel:jdk 15scope:eqversion:1.1.8

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:7.11

Trust: 0.3

vendor:beamodel:systems weblogic server for win32 spscope:eqversion:8.13

Trust: 0.3

vendor:sshmodel:communications security ssh tectia managerscope:eqversion:2.0

Trust: 0.3

vendor:avayamodel:cvlanscope: - version: -

Trust: 0.3

vendor:sunmodel:jre 099scope:eqversion:1.1.8

Trust: 0.3

vendor:sunmodel:java system application server 2004q2 r3 enterprisescope:eqversion:7.0

Trust: 0.3

vendor:sunmodel:java enterprise system 2003q4scope: - version: -

Trust: 0.3

vendor:netscapemodel:netscapescope:eqversion:7.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.8

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:4.3.4

Trust: 0.3

vendor:sunmodel:java system application server 2004q2 r3 standardscope:eqversion:7.0

Trust: 0.3

vendor:iscmodel:bind a2scope:eqversion:9.4

Trust: 0.3

vendor:sunmodel:jre betascope:eqversion:1.5.0

Trust: 0.3

vendor:operamodel:software opera web browser win32scope:eqversion:5.10

Trust: 0.3

vendor:beamodel:systems weblogic express for win32 spscope:eqversion:7.01

Trust: 0.3

vendor:sunmodel:java system application server 2004q2scope:eqversion:7

Trust: 0.3

vendor:beamodel:systems weblogic express for win32 spscope:eqversion:7.06

Trust: 0.3

vendor:beamodel:systems weblogic express for win32 spscope:eqversion:7.02

Trust: 0.3

vendor:openvpnmodel:openvpnscope:eqversion:2.0.6

Trust: 0.3

vendor:debianmodel:linux mipsscope:eqversion:3.1

Trust: 0.3

vendor:pardusmodel:linuxscope:eqversion:20090

Trust: 0.3

vendor:freebsdmodel:-stablescope:eqversion:4.2

Trust: 0.3

vendor:iscmodel:bind a3scope:eqversion:9.4

Trust: 0.3

vendor:beamodel:systems weblogic server spscope:eqversion:7.03

Trust: 0.3

vendor:vmwaremodel:acescope:eqversion:2.0

Trust: 0.3

vendor:netbsdmodel:3.1 rc3scope: - version: -

Trust: 0.3

vendor:sybasemodel:e-biz impactscope:eqversion:5.5

Trust: 0.3

vendor:sybasemodel:asescope:eqversion:11.5

Trust: 0.3

vendor:beamodel:systems weblogic server for win32 spscope:eqversion:7.03

Trust: 0.3

vendor:hpmodel:hp-ux b.11.23scope: - version: -

Trust: 0.3

vendor:ubuntumodel:linux sparcscope:eqversion:5.10

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:8.02

Trust: 0.3

vendor:ipcopmodel:ipcopscope:eqversion:1.4.12

Trust: 0.3

vendor:sunmodel:jrescope:eqversion:1.1.6

Trust: 0.3

vendor:vmwaremodel:esx serverscope:eqversion:3.0

Trust: 0.3

vendor:sunmodel:java system application server enterprise 2004q2 r5scope:eqversion:7.0.0

Trust: 0.3

vendor:opensslmodel:project opensslscope:eqversion:0.9.8

Trust: 0.3

vendor:freebsdmodel:-release-p7scope:eqversion:4.8

Trust: 0.3

vendor:sybasemodel:unwired accelerator and enterprise portalscope:eqversion:8.0

Trust: 0.3

vendor:sunmodel:one web server sp6scope:eqversion:6.0

Trust: 0.3

vendor:sunmodel:jre 14scope:eqversion:1.1.8

Trust: 0.3

vendor:beamodel:systems weblogic server for win32scope:eqversion:7.0

Trust: 0.3

vendor:sunmodel:jre 13scope:eqversion:1.1.8

Trust: 0.3

vendor:sybasemodel:powerbuilderscope:eqversion:10.5

Trust: 0.3

vendor:ciscomodel:secure acs for windows ntscope:eqversion:3.2

Trust: 0.3

vendor:redhatmodel:enterprise linux extrasscope:eqversion:3

Trust: 0.3

vendor:sunmodel:jdk 12scope:eqversion:1.1.8

Trust: 0.3

vendor:iscmodel:bind b3scope:neversion:9.4

Trust: 0.3

vendor:sybasemodel:mach desktopscope:eqversion:2.2.1

Trust: 0.3

vendor:ciscomodel:ons 15454sdhscope:eqversion:4.6(1)

Trust: 0.3

vendor:sunmodel:jdk 11scope:eqversion:1.1.8

Trust: 0.3

vendor:sgimodel:advanced linux environmentscope:eqversion:3.0

Trust: 0.3

vendor:sunmodel:secure global desktopscope:neversion:4.3

Trust: 0.3

vendor:opensslmodel:project opensslscope:eqversion:0.9.4

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.2.5

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:8.0.2

Trust: 0.3

vendor:sshmodel:communications security ssh tectia managerscope:neversion:2.1.4

Trust: 0.3

vendor:ipcopmodel:ipcopscope:neversion:1.4.13

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:10.1

Trust: 0.3

vendor:beamodel:systems weblogic server for win32 spscope:eqversion:7.04

Trust: 0.3

vendor:ciscomodel:security agentscope:eqversion:4.0.1

Trust: 0.3

vendor:vmwaremodel:playerscope:eqversion:2.0.1

Trust: 0.3

vendor:sunmodel:one web server sp10scope:eqversion:6.0

Trust: 0.3

vendor:openpkgmodel:openpkgscope:eqversion:2.0

Trust: 0.3

vendor:sybasemodel:eii avaki sdfscope:eqversion:7.0

Trust: 0.3

vendor:avayamodel:aura sip enablement servicesscope:eqversion:3.1

Trust: 0.3

vendor:sunmodel:java system application server standard platform q1scope:eqversion:8.12005

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:7.52

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:4.10

Trust: 0.3

vendor:redhatmodel:red hat network satellite (for rhelscope:eqversion:3)4.2

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:4.6

Trust: 0.3

vendor:arkoonmodel:ssl360scope:eqversion:2.0/2

Trust: 0.3

vendor:hpmodel:webproxy a.02.10scope: - version: -

Trust: 0.3

vendor:openofficemodel:openofficescope:eqversion:2.4.2

Trust: 0.3

vendor:sunmodel:java system application server enterprise 2004q2 r4scope:eqversion:7.0.0

Trust: 0.3

vendor:sunmodel:java system web server sp3scope:eqversion:6.1

Trust: 0.3

vendor:securemodel:computing snapgear sg710scope:eqversion:0

Trust: 0.3

vendor:ciscomodel:call manager es62scope:eqversion:4.0

Trust: 0.3

vendor:sunmodel:java system web server sp4scope:eqversion:6.0

Trust: 0.3

vendor:ciscomodel:secure acs buildscope:neversion:4.1(1)23

Trust: 0.3

vendor:sunmodel:one web server sp5scope:eqversion:6.0

Trust: 0.3

vendor:s u s emodel:linux personalscope:eqversion:8.2

Trust: 0.3

vendor:opensslmodel:project openssl cscope:neversion:0.9.8

Trust: 0.3

vendor:hpmodel:openvms secure web serverscope:neversion:2.2

Trust: 0.3

vendor:vmwaremodel:acescope:neversion:2.0.3

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:5.10

Trust: 0.3

vendor:sybasemodel:bpi for healthcarescope:eqversion:2.2

Trust: 0.3

vendor:sunmodel:jdk 099scope:eqversion:1.1.8

Trust: 0.3

vendor:sunmodel:jre 006scope:eqversion:1.2.2

Trust: 0.3

vendor:avayamodel:s8500scope:eqversion:0

Trust: 0.3

vendor:operamodel:software opera web browser win32scope:eqversion:6.0.3

Trust: 0.3

vendor:ciscomodel:secure acs for windows ntscope:eqversion:3.3

Trust: 0.3

vendor:sybasemodel:powerbuilderscope:eqversion:10.2.0

Trust: 0.3

vendor:beamodel:systems weblogic server spscope:eqversion:7.0.0.13

Trust: 0.3

vendor:hpmodel:webproxy a.02.00scope: - version: -

Trust: 0.3

vendor:beamodel:systems weblogic serverscope:eqversion:7.0.0.1

Trust: 0.3

vendor:hpmodel:virtualvault a.04.70scope: - version: -

Trust: 0.3

vendor:redhatmodel:network satellite (for rhelscope:eqversion:4)5.1

Trust: 0.3

vendor:sunmodel:jdkscope:eqversion:1.1.6

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:11.0

Trust: 0.3

vendor:sunmodel:sdk 02scope:eqversion:1.3

Trust: 0.3

vendor:avayamodel:s8710 r2.0.1scope: - version: -

Trust: 0.3

vendor:ibmmodel:hardware management console for pseries r1.0scope:eqversion:6.0

Trust: 0.3

vendor:redhatmodel:advanced workstation for the itanium processor ia64scope:eqversion:2.1

Trust: 0.3

vendor:sybasemodel:e-biz impactscope:eqversion:5.4.5

Trust: 0.3

vendor:sunmodel:java system application server enterprise edition q1scope:eqversion:8.12005

Trust: 0.3

vendor:opensslmodel:project openssl jscope:eqversion:0.9.7

Trust: 0.3

vendor:slackwaremodel:linux -currentscope: - version: -

Trust: 0.3

vendor:iscmodel:bind -p2scope:neversion:9.3.2

Trust: 0.3

vendor:turbolinuxmodel:homescope: - version: -

Trust: 0.3

vendor:vmwaremodel:serverscope:eqversion:1.0.4

Trust: 0.3

vendor:ciscomodel:ons optical transport platformscope:eqversion:154543.3

Trust: 0.3

vendor:sybasemodel:easerverscope:eqversion:5.0

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:4.4.1

Trust: 0.3

vendor:ciscomodel:ons 15454sdhscope:eqversion:4.5

Trust: 0.3

vendor:sshmodel:communications security ssh tectia jscope:eqversion:4.0

Trust: 0.3

vendor:ciscomodel:ons optical transport platformscope:eqversion:154544.0

Trust: 0.3

vendor:gentoomodel:linuxscope: - version: -

Trust: 0.3

vendor:sunmodel:jdk 1.5.0.0 03scope: - version: -

Trust: 0.3

vendor:turbolinuxmodel:desktopscope:eqversion:10.0

Trust: 0.3

vendor:opensslmodel:project openssl kscope:eqversion:0.9.6

Trust: 0.3

vendor:redhatmodel:advanced workstation for the itanium processorscope:eqversion:2.1

Trust: 0.3

vendor:turbolinuxmodel:serverscope:eqversion:10.0

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:4.1

Trust: 0.3

vendor:s u s emodel:novell linux posscope:eqversion:9

Trust: 0.3

vendor:ciscomodel:ons optical transport platformscope:eqversion:154542.3(5)

Trust: 0.3

vendor:arkoonmodel:ssl360scope:eqversion:1.0

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:4.10

Trust: 0.3

vendor:openofficemodel:openofficescope:eqversion:2.0.3-1

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.1

Trust: 0.3

vendor:sunmodel:jdk 10scope:eqversion:1.1.8

Trust: 0.3

vendor:sunmodel:solaris 10 x86scope: - version: -

Trust: 0.3

vendor:sybasemodel:ffi uofxscope:eqversion:0

Trust: 0.3

vendor:debianmodel:linux ia-32scope:eqversion:3.1

Trust: 0.3

vendor:ciscomodel:gss global site selectorscope:eqversion:44920

Trust: 0.3

vendor:redhatmodel:network satellite (for rhelscope:eqversion:4)4.2

Trust: 0.3

vendor:s u s emodel:suse linux openexchange serverscope:eqversion:4.0

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:7.50

Trust: 0.3

vendor:freebsdmodel:-prereleasescope:eqversion:4.9

Trust: 0.3

vendor:sunmodel:jrescope:eqversion:1.3.0

Trust: 0.3

vendor:s u s emodel:linux professional x86 64scope:eqversion:9.0

Trust: 0.3

vendor:turbolinuxmodel:multimediascope: - version: -

Trust: 0.3

vendor:ciscomodel:ons optical transport platformscope:eqversion:154544.0(2)

Trust: 0.3

vendor:freebsdmodel:-stablescope:eqversion:4.1.1

Trust: 0.3

vendor:ciscomodel:wide area file servicesscope:eqversion:0

Trust: 0.3

vendor:s u s emodel:linux desktopscope:eqversion:1.0

Trust: 0.3

vendor:ciscomodel:call manager sr2cscope:eqversion:4.0

Trust: 0.3

vendor:sunmodel:java web proxy server sp2scope:eqversion:3.6

Trust: 0.3

vendor:freebsdmodel:alphascope:eqversion:5.0

Trust: 0.3

vendor:attachmatemodel:reflectionscope:neversion:13.0.5

Trust: 0.3

vendor:beamodel:systems weblogic expressscope:eqversion:8.1

Trust: 0.3

vendor:beamodel:systems weblogic server spscope:eqversion:8.11

Trust: 0.3

vendor:ciscomodel:secure acs for unixscope:eqversion:2.0

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:4.5

Trust: 0.3

vendor:turbolinuxmodel:fujiscope: - version: -

Trust: 0.3

vendor:opensslmodel:project openssl bscope:eqversion:0.9.7

Trust: 0.3

vendor:beamodel:systems weblogic server for win32 spscope:eqversion:8.11

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:neversion:1.0.6

Trust: 0.3

vendor:sybasemodel:asescope:eqversion:12.5.2

Trust: 0.3

vendor:sybasemodel:unwired orchestratorscope:eqversion:5.0

Trust: 0.3

vendor:beamodel:systems weblogic express for win32scope:eqversion:7.0

Trust: 0.3

vendor:sybasemodel:afariascope:eqversion:5.4

Trust: 0.3

vendor:sunmodel:jsse 03scope:eqversion:1.0.3

Trust: 0.3

vendor:oraclemodel:http serverscope:eqversion:9.2.0

Trust: 0.3

vendor:ubuntumodel:linux lts amd64scope:eqversion:6.06

Trust: 0.3

vendor:sunmodel:one web server sp1scope:eqversion:6.0

Trust: 0.3

vendor:openpkgmodel:e1.0-solidscope: - version: -

Trust: 0.3

vendor:sunmodel:jre 003scope:eqversion:1.2.1

Trust: 0.3

vendor:s u s emodel:suse linux retail solutionscope:eqversion:8.0

Trust: 0.3

vendor:beamodel:systems weblogic expressscope:eqversion:9.2

Trust: 0.3

vendor:vmwaremodel:serverscope:neversion:1.0.5

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:5.1

Trust: 0.3

vendor:ingatemodel:firewallscope:neversion:4.5.1

Trust: 0.3

vendor:ciscomodel:ons 15454sdhscope:eqversion:4.1(2)

Trust: 0.3

vendor:sybasemodel:afariascope:eqversion:5.2

Trust: 0.3

vendor:beamodel:systems weblogic serverscope:eqversion:8.1

Trust: 0.3

vendor:s u s emodel:suse linux standard serverscope:eqversion:8.0

Trust: 0.3

vendor:ibmmodel:hardware management console for pseries r5.0scope:eqversion:4.0

Trust: 0.3

vendor:s u s emodel:linux professionalscope:eqversion:10.1

Trust: 0.3

vendor:netscapemodel:netscapescope:eqversion:7.2

Trust: 0.3

vendor:freebsdmodel:-release/alphascope:eqversion:5.1

Trust: 0.3

vendor:sybasemodel:ffi bptwscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:ons 15454sdhscope:eqversion:4.1(3)

Trust: 0.3

vendor:ciscomodel:security agentscope:eqversion:2.1

Trust: 0.3

vendor:s u s emodel:linux professionalscope:eqversion:9.3

Trust: 0.3

vendor:sunmodel:java web proxy server sp6scope:eqversion:3.6

Trust: 0.3

vendor:s u s emodel:linux personalscope:eqversion:9.0

Trust: 0.3

vendor:openpkgmodel:openpkgscope:eqversion:2.5

Trust: 0.3

vendor:ciscomodel:ciscoworks common management foundationscope:eqversion:2.0

Trust: 0.3

vendor:vmwaremodel:playerscope:eqversion:1.0.4

Trust: 0.3

vendor:sunmodel:java system application server 2004q2 r2 standardscope:eqversion:7.0

Trust: 0.3

vendor:sshmodel:communications security ssh tectia jscope:eqversion:4.3.2

Trust: 0.3

vendor:ciscomodel:call manager 4.1 sr4scope: - version: -

Trust: 0.3

vendor:hpmodel:openvms secure web serverscope:eqversion:2.1-1

Trust: 0.3

vendor:hpmodel:virtualvault a.04.60scope: - version: -

Trust: 0.3

vendor:s u s emodel:open-enterprise-serverscope:eqversion:0

Trust: 0.3

vendor:sybasemodel:afariascope:eqversion:5.3

Trust: 0.3

vendor:openofficemodel:openofficescope:eqversion:2.0.3

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:3.2.1

Trust: 0.3

vendor:freebsdmodel:-release-p14scope:eqversion:5.0

Trust: 0.3

vendor:attachmatemodel:reflectionscope:eqversion:10.0

Trust: 0.3

vendor:sunmodel:java enterprise system 2005q4scope: - version: -

Trust: 0.3

vendor:beamodel:systems weblogic expressscope:eqversion:9.0

Trust: 0.3

vendor:redmodel:hat fedora core5scope: - version: -

Trust: 0.3

vendor:beamodel:systems weblogic server spscope:eqversion:7.02

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:4.6

Trust: 0.3

vendor:oraclemodel:http serverscope:eqversion:1.0.2.0

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.0.1

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:4.4

Trust: 0.3

vendor:ipcopmodel:ipcopscope:eqversion:1.4.10

Trust: 0.3

vendor:beamodel:systems weblogic serverscope:eqversion:9.2

Trust: 0.3

vendor:ciscomodel:secure acs for windows ntscope:eqversion:3.0.3

Trust: 0.3

vendor:ingatemodel:firewalllscope:eqversion:4.4

Trust: 0.3

vendor:sunmodel:one web proxy serverscope:eqversion:3.6

Trust: 0.3

vendor:sunmodel:sdk 01ascope:eqversion:1.3.1

Trust: 0.3

vendor:beamodel:systems weblogic express spscope:eqversion:8.15

Trust: 0.3

vendor:hpmodel:system management homepagescope:neversion:2.1.7

Trust: 0.3

vendor:openofficemodel:betascope:eqversion:2.0

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:5.04

Trust: 0.3

vendor:sunmodel:solaris 9 x86 updatescope:eqversion:5

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:5.5

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:4.0.x

Trust: 0.3

vendor:sshmodel:communications security ssh tectia managerscope:eqversion:1.2

Trust: 0.3

vendor:ciscomodel:ons optical transport platformscope:eqversion:154543.4

Trust: 0.3

vendor:vmwaremodel:acescope:neversion:1.0.5

Trust: 0.3

vendor:mozillamodel:network security servicesscope:neversion:3.11.3

Trust: 0.3

vendor:beamodel:systems weblogic express spscope:eqversion:8.14

Trust: 0.3

vendor:openbsdmodel:openbsdscope:eqversion:3.8

Trust: 0.3

vendor:ciscomodel:ons ios-based bladesscope:eqversion:15454

Trust: 0.3

vendor:sunmodel:jre 004scope:eqversion:1.2.2

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:7.23

Trust: 0.3

vendor:beamodel:systems weblogic server spscope:eqversion:7.07

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:4.2.3

Trust: 0.3

vendor:sybasemodel:rfid enterprisescope:eqversion:2.1

Trust: 0.3

vendor:freebsdmodel:-stablescope:eqversion:4.11

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:6.0

Trust: 0.3

vendor:opensslmodel:project openssl dscope:eqversion:0.9.7

Trust: 0.3

vendor:vmwaremodel:playerscope:eqversion:2.0

Trust: 0.3

vendor:beamodel:systems weblogic server for win32 spscope:eqversion:7.07

Trust: 0.3

vendor:beamodel:systems weblogic express for win32 spscope:eqversion:7.0.0.12

Trust: 0.3

vendor:navisionmodel:financials serverscope:eqversion:3.0

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:8.1

Trust: 0.3

vendor:themodel:legion of the bouncy castle java cryptography apiscope:eqversion:1.37

Trust: 0.3

vendor:vmwaremodel:playerscope:eqversion:2.0.2

Trust: 0.3

vendor:freebsdmodel:-stablepre2002-03-07scope:eqversion:4.5

Trust: 0.3

vendor:ciscomodel:unified presence serverscope:eqversion:1.0(2)

Trust: 0.3

vendor:sshmodel:communications security ssh tectia serverscope:eqversion:4.0

Trust: 0.3

vendor:sshmodel:communications security ssh tectia server for ibm z/osscope:eqversion:5.2

Trust: 0.3

vendor:sshmodel:communications security ssh tectia connectorscope:eqversion:5.1

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:neversion:1.5.0.8

Trust: 0.3

vendor:sybasemodel:ffi cons bankingscope:eqversion:0

Trust: 0.3

vendor:freebsdmodel:alphascope:eqversion:4.0

Trust: 0.3

vendor:opensslmodel:project openssl ascope:eqversion:0.9.6

Trust: 0.3

vendor:ciscomodel:call managerscope:eqversion:4.2(3)

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.9

Trust: 0.3

vendor:sunmodel:java enterprise system 2004q2scope: - version: -

Trust: 0.3

vendor:van dykemodel:securefxscope:eqversion:4.0.2

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.1.1

Trust: 0.3

vendor:sunmodel:java system web server sp7scope:eqversion:6.0

Trust: 0.3

vendor:opensslmodel:project openssl fscope:eqversion:0.9.7

Trust: 0.3

vendor:ciscomodel:ciscoworks common management foundationscope:eqversion:2.2

Trust: 0.3

vendor:beamodel:systems weblogic express spscope:eqversion:7.01

Trust: 0.3

vendor:vmwaremodel:serverscope:eqversion:1.0.2

Trust: 0.3

vendor:susemodel:linux enterprise serverscope:eqversion:9

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.5.0.5

Trust: 0.3

vendor:hpmodel:hp-ux b.11.11scope: - version: -

Trust: 0.3

vendor:operamodel:software opera web browser 3win32scope:eqversion:7.0

Trust: 0.3

vendor:vmwaremodel:esx serverscope:eqversion:2.5.4

Trust: 0.3

vendor:sunmodel:java web proxy server sp1scope:eqversion:4.0

Trust: 0.3

vendor:beamodel:systems weblogic express spscope:eqversion:7.06

Trust: 0.3

vendor:ciscomodel:call manager es40scope:eqversion:4.0

Trust: 0.3

vendor:s u s emodel:novell linux desktopscope:eqversion:9.0

Trust: 0.3

vendor:sunmodel:jre 09scope:eqversion:1.1.6

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:4.3

Trust: 0.3

vendor:netbsdmodel:netbsdscope:eqversion:2.0.3

Trust: 0.3

vendor:ciscomodel:security agentscope:eqversion:5.0

Trust: 0.3

vendor:operamodel:software opera web browser 2win32scope:eqversion:7.0

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:8.01

Trust: 0.3

vendor:ciscomodel:secure acs for windows serverscope:eqversion:3.2

Trust: 0.3

vendor:freebsdmodel:-stablepre050201scope:eqversion:4.2

Trust: 0.3

vendor:ciscomodel:idsscope:eqversion:0

Trust: 0.3

vendor:sybasemodel:appeonscope:eqversion:2.8

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.5.0.7

Trust: 0.3

vendor:operamodel:software opera web browser win32scope:eqversion:6.0.4

Trust: 0.3

vendor:debianmodel:linux armscope:eqversion:3.1

Trust: 0.3

vendor:vmwaremodel:workstationscope:eqversion:6.0.2

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:4.4

Trust: 0.3

vendor:sybasemodel:bpi for healthcarescope:eqversion:2.2.1

Trust: 0.3

vendor:sunmodel:java web proxy server sp5scope:eqversion:3.6

Trust: 0.3

vendor:sunmodel:sdk .0 05scope:eqversion:1.3

Trust: 0.3

vendor:sunmodel:jre 003scope:eqversion:1.1.8

Trust: 0.3

vendor:turbolinuxmodel:serverscope:eqversion:10.0x86

Trust: 0.3

vendor:ciscomodel:ons 15454sdhscope:eqversion:4.0

Trust: 0.3

vendor:iscmodel:bind -p1scope:eqversion:9.3.2

Trust: 0.3

vendor:ciscomodel:ons 15454sdhscope:eqversion:3.2

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:9.0

Trust: 0.3

vendor:ciscomodel:series airespace wireless lan controllerscope:eqversion:40003.1.59.24

Trust: 0.3

vendor:sunmodel:sdkscope:eqversion:1.3

Trust: 0.3

vendor:ibmmodel:hardware management console for iseries r1.0scope:eqversion:5.0

Trust: 0.3

vendor:ciscomodel:ons optical transport platformscope:eqversion:154544.5

Trust: 0.3

vendor:s u s emodel:open-enterprise-serverscope:eqversion:9.0

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:7.20

Trust: 0.3

vendor:s u s emodel:unitedlinuxscope:eqversion:1.0

Trust: 0.3

vendor:sshmodel:communications security ssh tectia serverscope:neversion:5.1.1

Trust: 0.3

vendor:sunmodel:java system web server sp1scope:eqversion:6.0

Trust: 0.3

vendor:ciscomodel:series airespace wireless lan controllerscope:eqversion:20003.1.59.24

Trust: 0.3

vendor:s u s emodel:linux personal x86 64scope:eqversion:9.3

Trust: 0.3

vendor:s u s emodel:linux personalscope:eqversion:10.1

Trust: 0.3

vendor:beamodel:systems weblogic express spscope:eqversion:7.0.0.14

Trust: 0.3

vendor:sunmodel:sdk .0 01scope:eqversion:1.4

Trust: 0.3

vendor:turbolinuxmodel:appliance serverscope:eqversion:2.0

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:5.12

Trust: 0.3

vendor:ciscomodel:security agentscope:eqversion:5.0.193

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:6.10

Trust: 0.3

vendor:ciscomodel:call manager sr1scope:eqversion:4.1

Trust: 0.3

vendor:ciscomodel:gss global site selectorscope:eqversion:4480

Trust: 0.3

vendor:s u s emodel:linux professionalscope:eqversion:10.0

Trust: 0.3

vendor:beamodel:systems weblogic express for win32 spscope:eqversion:8.15

Trust: 0.3

vendor:beamodel:systems weblogic server for win32scope:eqversion:9.0

Trust: 0.3

vendor:ciscomodel:secure acs for windows ntscope:eqversion:2.6.4

Trust: 0.3

vendor:sybasemodel:iqscope:eqversion:12.7

Trust: 0.3

vendor:s u s emodel:linux professionalscope:eqversion:8.2

Trust: 0.3

vendor:oraclemodel:http serverscope:eqversion:1.0.2.2

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:5.2

Trust: 0.3

vendor:vmwaremodel:acescope:eqversion:1.0

Trust: 0.3

vendor:avayamodel:s8300 r2.0.0scope: - version: -

Trust: 0.3

vendor:beamodel:systems weblogic express for win32 spscope:eqversion:8.14

Trust: 0.3

vendor:oraclemodel:http serverscope:eqversion:9.0.3.1

Trust: 0.3

vendor:sshmodel:communications security ssh tectia serverscope:eqversion:4.3

Trust: 0.3

vendor:sunmodel:jre .0 03scope:eqversion:1.3

Trust: 0.3

vendor:opensslmodel:project opensslscope:eqversion:0.9.5

Trust: 0.3

vendor:openofficemodel:openofficescope:eqversion:2.3.1

Trust: 0.3

vendor:ciscomodel:secure acs for windows ntscope:eqversion:3.0

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:5.3

Trust: 0.3

vendor:sybasemodel:mfolioscope:eqversion:2.0

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:3.3.1

Trust: 0.3

vendor:sshmodel:communications security ssh tectia server for ibm z/osscope:neversion:5.2.1

Trust: 0.3

vendor:redhatmodel:enterprise linux ws ia64scope:eqversion:2.1

Trust: 0.3

vendor:avayamodel:s8710 r2.0.0scope: - version: -

Trust: 0.3

vendor:operamodel:software opera web browser win32scope:eqversion:5.11

Trust: 0.3

vendor:openpkgmodel:openpkgscope:eqversion:2.3

Trust: 0.3

vendor:iscmodel:bind rc1scope:eqversion:9.3.3

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:4.3

Trust: 0.3

vendor:sunmodel:solaris 9 sparcscope: - version: -

Trust: 0.3

vendor:iscmodel:bind b1scope:eqversion:9.4

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:3.2

Trust: 0.3

vendor:sunmodel:jdk 003scope:eqversion:1.1.8

Trust: 0.3

vendor:ciscomodel:ons 15454sdhscope:eqversion:3.3

Trust: 0.3

vendor:sshmodel:communications security ssh tectiascope:eqversion:1.3

Trust: 0.3

vendor:vmwaremodel:playerscope:eqversion:1.0.2

Trust: 0.3

vendor:ciscomodel:sip proxy serverscope: - version: -

Trust: 0.3

vendor:ciscomodel:secure acs for unixscope:eqversion:2.3.6.1

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.2.3

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:6.0

Trust: 0.3

vendor:iscmodel:bind b2scope:eqversion:9.4

Trust: 0.3

vendor:operamodel:software opera web browser win32 betascope:eqversion:7.02

Trust: 0.3

vendor:freebsdmodel:-stablescope:eqversion:4.5

Trust: 0.3

vendor:ciscomodel:secure acs solution enginescope:eqversion:3.3.2

Trust: 0.3

vendor:beamodel:systems weblogic expressscope:eqversion:9.1

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:5.10

Trust: 0.3

vendor:openofficemodel:openofficescope:eqversion:2.1

Trust: 0.3

vendor:sybasemodel:iqscope:eqversion:12.6

Trust: 0.3

vendor:mozillamodel:firefoxscope:neversion:1.5.8

Trust: 0.3

vendor:debianmodel:linux m68kscope:eqversion:3.1

Trust: 0.3

vendor:ciscomodel:ons 15454sdhscope:eqversion:4.0(2)

Trust: 0.3

vendor:avayamodel:messaging storage server mm3.0scope: - version: -

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:4.7

Trust: 0.3

vendor:redhatmodel:enterprise linux wsscope:eqversion:3

Trust: 0.3

vendor:avayamodel:s8500 cmscope:eqversion:3.1

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.11

Trust: 0.3

vendor:redmodel:hat enterprise linux as ia64scope:eqversion:2.1

Trust: 0.3

vendor:openvpnmodel:openvpnscope:eqversion:2.0.7

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:5.4

Trust: 0.3

vendor:ciscomodel:ons msppscope:eqversion:154540

Trust: 0.3

vendor:sunmodel:jssescope:eqversion:1.0.3

Trust: 0.3

vendor:netbsdmodel:current pre20010805scope: - version: -

Trust: 0.3

vendor:operamodel:software opera web browser win32scope:eqversion:6.0.2

Trust: 0.3

vendor:sunmodel:java web proxy serverscope:eqversion:4.0

Trust: 0.3

vendor:debianmodel:linuxscope:eqversion:3.1

Trust: 0.3

vendor:operamodel:software opera web browser linuxscope:eqversion:5.0

Trust: 0.3

vendor:ciscomodel:call manager es55scope:eqversion:4.1

Trust: 0.3

vendor:sybasemodel:eii avaki sdfscope:eqversion:5.1

Trust: 0.3

vendor:vmwaremodel:player buildscope:neversion:2.0.380004

Trust: 0.3

vendor:themodel:legion of the bouncy castle java cryptography apiscope:neversion:1.38

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:5.2

Trust: 0.3

vendor:debianmodel:linux alphascope:eqversion:3.1

Trust: 0.3

vendor:ciscomodel:security agentscope:eqversion:4.5.1.657

Trust: 0.3

vendor:operamodel:software opera web browser linuxscope:eqversion:6.0.2

Trust: 0.3

vendor:beamodel:systems weblogic serverscope:eqversion:9.1

Trust: 0.3

vendor:sunmodel:java system web server sp1scope:eqversion:6.1

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:4.2.1

Trust: 0.3

vendor:sunmodel:java web proxy server sp1scope:eqversion:3.6

Trust: 0.3

vendor:sunmodel:solaris updatescope:eqversion:95

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.1.3

Trust: 0.3

vendor:sybasemodel:solonde etlscope:eqversion:4.0

Trust: 0.3

vendor:sunmodel:jdkscope:eqversion:1.2.1

Trust: 0.3

vendor:mandrivamodel:linux mandrake x86 64scope:eqversion:2006.0

Trust: 0.3

vendor:opensslmodel:project openssl beta1scope:eqversion:0.9.7

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:5.3

Trust: 0.3

vendor:sybasemodel:iqscope:eqversion:12.5

Trust: 0.3

vendor:freebsdmodel:-stablescope:eqversion:4.6

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.0.2

Trust: 0.3

vendor:avayamodel:aura sip enablement servicesscope:eqversion:3.0

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.3

Trust: 0.3

vendor:avayamodel:s8700 r2.0.1scope: - version: -

Trust: 0.3

vendor:van dykemodel:vshellscope:eqversion:3.0

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.1.3

Trust: 0.3

vendor:hpmodel:system management homepagescope:neversion:2.1.8

Trust: 0.3

vendor:ciscomodel:application control engine modulescope:eqversion:0

Trust: 0.3

vendor:sunmodel:solaris 9 x86scope: - version: -

Trust: 0.3

vendor:opensslmodel:project openssl mscope:eqversion:0.9.6

Trust: 0.3

vendor:s u s emodel:linux professionalscope:eqversion:9.2

Trust: 0.3

vendor:beamodel:systems weblogic express spscope:eqversion:8.13

Trust: 0.3

vendor:opensslmodel:project openssl bscope:eqversion:0.9.2

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:4.3

Trust: 0.3

vendor:avayamodel:interactive responsescope:eqversion:2.0

Trust: 0.3

vendor:sybasemodel:easerverscope:eqversion:5.1

Trust: 0.3

vendor:sunmodel:java system web serverscope:eqversion:6.0

Trust: 0.3

vendor:opensslmodel:project openssl jscope:eqversion:0.9.6

Trust: 0.3

vendor:sshmodel:communications security ssh tectia serverscope:eqversion:4.4.3

Trust: 0.3

vendor:oraclemodel:peoplesoft enterprise peopletoolsscope:eqversion:8.48

Trust: 0.3

vendor:oraclemodel:peoplesoft enterprise peopletoolsscope:eqversion:8.47

Trust: 0.3

vendor:oraclemodel:peoplesoft enterprise peopletoolsscope:eqversion:8.22

Trust: 0.3

vendor:oraclemodel:oracle9i standard editionscope:eqversion:9.2.8

Trust: 0.3

vendor:oraclemodel:oracle9i standard editionscope:eqversion:9.2.7

Trust: 0.3

vendor:oraclemodel:oracle9i standard editionscope:eqversion:9.2.6

Trust: 0.3

vendor:oraclemodel:oracle9i standard editionscope:eqversion:9.2.0.5

Trust: 0.3

vendor:oraclemodel:oracle9i standard edition fipsscope:eqversion:9.0.1.5

Trust: 0.3

vendor:oraclemodel:oracle9i standard editionscope:eqversion:9.0.1.5

Trust: 0.3

vendor:oraclemodel:oracle9i standard editionscope:eqversion:9.0.1.4

Trust: 0.3

vendor:oraclemodel:oracle9i personal editionscope:eqversion:9.2.8

Trust: 0.3

vendor:oraclemodel:oracle9i personal editionscope:eqversion:9.2.7

Trust: 0.3

vendor:oraclemodel:oracle9i personal editionscope:eqversion:9.2.6

Trust: 0.3

vendor:oraclemodel:oracle9i personal editionscope:eqversion:9.2.0.5

Trust: 0.3

vendor:oraclemodel:oracle9i personal edition fipsscope:eqversion:9.0.1.5

Trust: 0.3

vendor:oraclemodel:oracle9i personal editionscope:eqversion:9.0.1.5

Trust: 0.3

vendor:oraclemodel:oracle9i personal editionscope:eqversion:9.0.1.4

Trust: 0.3

vendor:oraclemodel:oracle9i enterprise editionscope:eqversion:9.2.8.0

Trust: 0.3

vendor:oraclemodel:oracle9i enterprise editionscope:eqversion:9.2.7.0

Trust: 0.3

vendor:oraclemodel:oracle9i enterprise editionscope:eqversion:9.2.6.0

Trust: 0.3

vendor:oraclemodel:oracle9i enterprise editionscope:eqversion:9.2.0.5

Trust: 0.3

vendor:oraclemodel:oracle9i enterprise edition fipsscope:eqversion:9.0.1.5

Trust: 0.3

vendor:oraclemodel:oracle9i enterprise editionscope:eqversion:9.0.1.5

Trust: 0.3

vendor:oraclemodel:oracle9i enterprise editionscope:eqversion:9.0.1.4

Trust: 0.3

vendor:oraclemodel:oracle8i standard editionscope:eqversion:8.1.7.4

Trust: 0.3

vendor:oraclemodel:oracle8i enterprise editionscope:eqversion:8.1.7.4.0

Trust: 0.3

vendor:oraclemodel:oracle10g standard editionscope:eqversion:10.2.3

Trust: 0.3

vendor:oraclemodel:oracle10g standard editionscope:eqversion:10.2.2

Trust: 0.3

vendor:oraclemodel:oracle10g standard editionscope:eqversion:10.2.1

Trust: 0.3

vendor:oraclemodel:oracle10g standard editionscope:eqversion:10.1.4.2

Trust: 0.3

vendor:oraclemodel:oracle10g standard editionscope:eqversion:10.1.0.5

Trust: 0.3

vendor:oraclemodel:oracle10g standard editionscope:eqversion:10.1.0.4

Trust: 0.3

vendor:oraclemodel:oracle10g standard editionscope:eqversion:10.1.0.3.1

Trust: 0.3

vendor:oraclemodel:oracle10g standard editionscope:eqversion:10.1.0.3

Trust: 0.3

vendor:oraclemodel:oracle10g standard editionscope:eqversion:10.1.0.2

Trust: 0.3

vendor:oraclemodel:oracle10g personal editionscope:eqversion:10.2.3

Trust: 0.3

vendor:oraclemodel:oracle10g personal editionscope:eqversion:10.2.2

Trust: 0.3

vendor:oraclemodel:oracle10g personal editionscope:eqversion:10.2.1

Trust: 0.3

vendor:oraclemodel:oracle10g personal editionscope:eqversion:10.1.0.4

Trust: 0.3

vendor:oraclemodel:oracle10g personal editionscope:eqversion:10.1.0.3.1

Trust: 0.3

vendor:oraclemodel:oracle10g personal editionscope:eqversion:10.1.0.3

Trust: 0.3

vendor:oraclemodel:oracle10g personal editionscope:eqversion:10.1.0.2

Trust: 0.3

vendor:oraclemodel:oracle10g enterprise editionscope:eqversion:10.2.3

Trust: 0.3

vendor:oraclemodel:oracle10g enterprise editionscope:eqversion:10.2.2

Trust: 0.3

vendor:oraclemodel:oracle10g enterprise editionscope:eqversion:10.2.1

Trust: 0.3

vendor:oraclemodel:oracle10g enterprise editionscope:eqversion:10.1.0.4

Trust: 0.3

vendor:oraclemodel:oracle10g enterprise editionscope:eqversion:10.1.0.3.1

Trust: 0.3

vendor:oraclemodel:oracle10g enterprise editionscope:eqversion:10.1.0.3

Trust: 0.3

vendor:oraclemodel:oracle10g enterprise editionscope:eqversion:10.1.0.2

Trust: 0.3

vendor:oraclemodel:oracle10g application serverscope:eqversion:10.1.3.4.0

Trust: 0.3

vendor:oraclemodel:oracle10g application serverscope:eqversion:10.1.3.0.0

Trust: 0.3

vendor:oraclemodel:oracle10g application serverscope:eqversion:10.1.2.2.0

Trust: 0.3

vendor:oraclemodel:oracle10g application serverscope:eqversion:10.1.2.1.0

Trust: 0.3

vendor:oraclemodel:oracle10g application serverscope:eqversion:10.1.2.0.2

Trust: 0.3

vendor:oraclemodel:oracle10g application serverscope:eqversion:10.1.2.0.1

Trust: 0.3

vendor:oraclemodel:oracle10g application serverscope:eqversion:10.1.2

Trust: 0.3

vendor:oraclemodel:oracle10g application serverscope:eqversion:9.0.4.2

Trust: 0.3

vendor:oraclemodel:oracle10g application serverscope:eqversion:9.0.4.1

Trust: 0.3

vendor:oraclemodel:identity management 10gscope:eqversion:10.1.4.0.1

Trust: 0.3

vendor:oraclemodel:9i application server releasescope:eqversion:11.0.2.2

Trust: 0.3

vendor:oraclemodel:enterprise manager grid control 10gscope:eqversion:10.2.1

Trust: 0.3

vendor:oraclemodel:enterprise manager grid control 10gscope:eqversion:10.1.5

Trust: 0.3

vendor:oraclemodel:enterprise manager grid control 10gscope:eqversion:10.1.4

Trust: 0.3

vendor:oraclemodel:enterprise manager grid control 10gscope:eqversion:10.1.3

Trust: 0.3

vendor:oraclemodel:e-business suite 11i cu2scope:eqversion:11.5.10

Trust: 0.3

vendor:oraclemodel:e-business suite 11iscope:eqversion:11.5.10

Trust: 0.3

vendor:oraclemodel:e-business suite 11iscope:eqversion:11.5.9

Trust: 0.3

vendor:oraclemodel:e-business suite 11iscope:eqversion:11.5.8

Trust: 0.3

vendor:oraclemodel:e-business suite 11iscope:eqversion:11.5.7

Trust: 0.3

vendor:oraclemodel:e-business suitescope:eqversion:11.0

Trust: 0.3

vendor:oraclemodel:developer suitescope:eqversion:10.1.2.0.2

Trust: 0.3

vendor:oraclemodel:developer suitescope:eqversion:9.0.4.3

Trust: 0.3

vendor:oraclemodel:developer suite 6iscope: - version: -

Trust: 0.3

vendor:oraclemodel:application server releasescope:eqversion:210.1.2.0.2

Trust: 0.3

vendor:oraclemodel:application server releasescope:eqversion:210.1.2.0.1

Trust: 0.3

vendor:oraclemodel:application server releasescope:eqversion:210.1.2.0.0

Trust: 0.3

vendor:oraclemodel:application server releasescope:eqversion:29.0.2.3

Trust: 0.3

vendor:oraclemodel:application server 10gscope:eqversion:9.0.4.3

Trust: 0.3

vendor:oraclemodel:application server 10gscope:eqversion:9.0.4.2

Trust: 0.3

vendor:oraclemodel:application server 10gscope:eqversion:9.0.4.1

Trust: 0.3

vendor:oraclemodel:application server 10gscope:eqversion:9.0.4

Trust: 0.3

vendor:hpmodel:oracle for openview for linux ltuscope:eqversion:0

Trust: 0.3

vendor:hpmodel:oracle for openviewscope:eqversion:9.1.1

Trust: 0.3

vendor:hpmodel:oracle for openviewscope:eqversion:8.1.7

Trust: 0.3

vendor:hpmodel:oracle for openviewscope:eqversion:9.2

Trust: 0.3

sources: CERT/CC: VU#386964 // CERT/CC: VU#221788 // CERT/CC: VU#845620 // CERT/CC: VU#547300 // BID: 19849 // BID: 22083 // JVNDB: JVNDB-2012-000079 // JVNDB: JVNDB-2007-000772 // JVNDB: JVNDB-2006-000532 // NVD: CVE-2006-4339

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2006-4339
value: MEDIUM

Trust: 1.0

CARNEGIE MELLON: VU#386964
value: 0.32

Trust: 0.8

CARNEGIE MELLON: VU#221788
value: 4.20

Trust: 0.8

CARNEGIE MELLON: VU#845620
value: 7.56

Trust: 0.8

CARNEGIE MELLON: VU#547300
value: 2.53

Trust: 0.8

IPA: JVNDB-2012-000079
value: MEDIUM

Trust: 0.8

IPA: JVNDB-2007-000772
value: MEDIUM

Trust: 0.8

NVD: CVE-2006-4339
value: MEDIUM

Trust: 0.8

nvd@nist.gov: CVE-2006-4339
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

IPA: JVNDB-2012-000079
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

IPA: JVNDB-2007-000772
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

NVD: CVE-2006-4339
severity: MEDIUM
baseScore: 5.1
vectorString: AV:N/AC:H/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

sources: CERT/CC: VU#386964 // CERT/CC: VU#221788 // CERT/CC: VU#845620 // CERT/CC: VU#547300 // JVNDB: JVNDB-2012-000079 // JVNDB: JVNDB-2007-000772 // JVNDB: JVNDB-2006-000532 // NVD: CVE-2006-4339

PROBLEMTYPE DATA

problemtype:CWE-255

Trust: 1.6

problemtype:CWE-310

Trust: 1.0

problemtype:CWE-20

Trust: 0.8

sources: JVNDB: JVNDB-2012-000079 // JVNDB: JVNDB-2007-000772 // JVNDB: JVNDB-2006-000532 // NVD: CVE-2006-4339

THREAT TYPE

network

Trust: 0.6

sources: BID: 19849 // BID: 22083

TYPE

Design Error

Trust: 0.3

sources: BID: 19849

CONFIGURATIONS

sources: JVNDB: JVNDB-2012-000079

PATCH

title:HS07-034url:http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS07-034/index.html

Trust: 1.6

title:Adobe Readerurl:http://get.adobe.com/reader/

Trust: 0.8

title:HS07-034url:http://www.hitachi-support.com/security_e/vuls_e/HS07-034_e/index-e.html

Trust: 0.8

title:Security Update 2006-007 (10.3.9 Server)url:http://www.apple.com/support/downloads/securityupdate20060071039server.html

Trust: 0.8

title:Security Update 2006-007 (10.4.8 Client PPC)url:http://www.apple.com/support/downloads/securityupdate20060071048clientppc.html

Trust: 0.8

title:Security Update 2006-007 (10.4.8 Server PPC)url:http://www.apple.com/support/downloads/securityupdate20060071048serverppc.html

Trust: 0.8

title:Security Update 2006-007 (10.4.8 Server Universal)url:http://www.apple.com/support/downloads/securityupdate20060071048serveruniversal.html

Trust: 0.8

title:Security Update 2006-007 (10.4.8 Client Intel)url:http://www.apple.com/support/downloads/securityupdate20060071048clientintel.html

Trust: 0.8

title:Security Update 2006-007 (10.3.9 Client)url:http://www.apple.com/support/downloads/securityupdate20060071039client.html

Trust: 0.8

title:Security Update 2006-007url:http://docs.info.apple.com/article.html?artnum=304829-en

Trust: 0.8

title:Java Release 6 for Mac OS X 10.4url:http://docs.info.apple.com/article.html?artnum=307177-en

Trust: 0.8

title:Java Release 6 for Mac OS X 10.4url:http://docs.info.apple.com/article.html?artnum=307177-ja

Trust: 0.8

title:Security Update 2006-007url:http://docs.info.apple.com/article.html?artnum=304829-ja

Trust: 0.8

title:BEA07-169.00url:http://dev2dev.bea.com/pub/advisory/238

Trust: 0.8

title:BEA07-169.00url:http://www.beasys.co.jp/dev2dev/resourcelibrary/advisoriesnotifications/bea07-169.html

Trust: 0.8

title:Oracle Critical Patch Update - January 2007url:http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujan2007.html

Trust: 0.8

title:RSA 署名に関する脆弱性の問題についてurl:http://www.furukawa.co.jp/fitelnet/topic/x509_attacks.html

Trust: 0.8

title:HPSBUX02165url:http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00794048

Trust: 0.8

title:HPSBUX02219url:http://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c01070495

Trust: 0.8

title:HPSBUX02165url:http://h50221.www5.hp.com/upassist/itrc_japan/assist2/secbltn/HP-UX/HPSBUX02165.html

Trust: 0.8

title:HPSBUX02219url:http://h50221.www5.hp.com/upassist/itrc_japan/assist2/secbltn/HP-UX/HPSBUX02219.html

Trust: 0.8

title:BIND 9: OpenSSL Vulnerabilitiesurl:http://marc.info/?l=bind-announce&m=116253119512445&w=2

Trust: 0.8

title:1003url:http://www.miraclelinux.com/support/index.php?q=node/99&errata_id=1003

Trust: 0.8

title:466url:http://www.miraclelinux.com/support/index.php?q=node/99&errata_id=466

Trust: 0.8

title:462url:http://www.miraclelinux.com/support/index.php?q=node/99&errata_id=462

Trust: 0.8

title:NV06-007url:http://www.nec.co.jp/security-info/secinfo/nv06-007.html

Trust: 0.8

title:CVE-2006-4339url:http://www.openoffice.org/security/cves/CVE-2006-4339.html

Trust: 0.8

title:secadv_20060905url:http://www.openssl.org/news/secadv_20060905.txt

Trust: 0.8

title:RHSA-2006:0661url:http://rhn.redhat.com/errata/RHSA-2006-0661.html

Trust: 0.8

title:SA-200609-01url:http://www.sendmail.com/security/advisories/SA-200609-01.txt.asc

Trust: 0.8

title:SA-200609-01.faqurl:http://www.sendmail.com/sm/security/sa-200609-01.faq/

Trust: 0.8

title:786url:http://www.ssh.com/company/news/2006/english/security/article/786/

Trust: 0.8

title:102686url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-102686-1

Trust: 0.8

title:102696url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-102696-1

Trust: 0.8

title:102656url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-102656-1

Trust: 0.8

title:102648url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-102648-1

Trust: 0.8

title:102759url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-102759-1

Trust: 0.8

title:102722url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-102722-1

Trust: 0.8

title:証明書の操作に関するセキュリティ上の脆弱性url:http://software.fujitsu.com/jp/security/products-fujitsu/solution/teamware2007_02.html

Trust: 0.8

title:Security Update 2006-007 (10.3.9 Client)url:http://www.apple.com/jp/ftp-info/reference/securityupdate20060071039client.html

Trust: 0.8

title:Security Update 2006-007 (10.3.9 Server)url:http://www.apple.com/jp/ftp-info/reference/securityupdate20060071039server.html

Trust: 0.8

title:Security Update 2006-007 (10.4.8 Client Intel)url:http://www.apple.com/jp/ftp-info/reference/securityupdate20060071048clientintel.html

Trust: 0.8

title:Security Update 2006-007 (10.4.8 Client PPC)url:http://www.apple.com/jp/ftp-info/reference/securityupdate20060071048clientppc.html

Trust: 0.8

title:Security Update 2006-007 (10.4.8 Server PPC)url:http://www.apple.com/jp/ftp-info/reference/securityupdate20060071048serverppc.html

Trust: 0.8

title:Security Update 2006-007 (10.4.8 Server Universal)url:http://www.apple.com/jp/ftp-info/reference/securityupdate20060071048serveruniversal.html

Trust: 0.8

title:Oracle Critical Patch Update - January 2007url:http://otn.oracle.co.jp/security/070119_77/top.html

Trust: 0.8

title:RSA署名に関する脆弱性についてurl:http://www.allied-telesis.co.jp/support/list/faq/vuls/20070907.html

Trust: 0.8

title:HS07-034url:http://www.hitachi.co.jp/Prod/comp/soft1/security/info/vuls/HS07-034/index.html

Trust: 0.8

title:solution 2061730url:http://esupport.trendmicro.co.jp/supportjp/viewxml.do?ContentID=JP-2061730

Trust: 0.8

title:InterScan Messaging Security Suite 5.11 Solaris / Linux用 Security Patch 公開のお知らせurl:http://www.trendmicro.co.jp/support/news.asp?id=959

Trust: 0.8

title:RHSA-2006:0661url:http://www.jp.redhat.com/support/errata/RHSA/RHSA-2006-0661J.html

Trust: 0.8

title:TLSA-2006-29url:http://www.turbolinux.co.jp/security/2006/TLSA-2006-29j.txt

Trust: 0.8

title:VU#845620url:http://software.fujitsu.com/jp/security/vulnerabilities/vu845620.html

Trust: 0.8

sources: JVNDB: JVNDB-2012-000079 // JVNDB: JVNDB-2007-000772 // JVNDB: JVNDB-2006-000532

EXTERNAL IDS

db:NVDid:CVE-2006-4339

Trust: 4.8

db:BIDid:22083

Trust: 3.7

db:CERT/CCid:VU#845620

Trust: 3.7

db:SECUNIAid:21709

Trust: 2.6

db:BIDid:19849

Trust: 2.1

db:SECUNIAid:22259

Trust: 1.8

db:SECUNIAid:22260

Trust: 1.8

db:SECUNIAid:22284

Trust: 1.8

db:JVNid:JVN51615542

Trust: 1.8

db:JVNDBid:JVNDB-2012-000079

Trust: 1.8

db:USCERTid:TA06-333A

Trust: 1.8

db:SECUNIAid:23280

Trust: 1.6

db:SECUNIAid:23309

Trust: 1.6

db:SECUNIAid:38568

Trust: 1.2

db:CERT/CCid:VU#221788

Trust: 1.1

db:VUPENid:ADV-2007-0343

Trust: 1.0

db:VUPENid:ADV-2007-2163

Trust: 1.0

db:VUPENid:ADV-2006-4366

Trust: 1.0

db:VUPENid:ADV-2006-4750

Trust: 1.0

db:VUPENid:ADV-2008-0905

Trust: 1.0

db:VUPENid:ADV-2006-4216

Trust: 1.0

db:VUPENid:ADV-2007-4224

Trust: 1.0

db:VUPENid:ADV-2006-3936

Trust: 1.0

db:VUPENid:ADV-2006-4329

Trust: 1.0

db:VUPENid:ADV-2006-4417

Trust: 1.0

db:VUPENid:ADV-2006-4206

Trust: 1.0

db:VUPENid:ADV-2007-2783

Trust: 1.0

db:VUPENid:ADV-2006-3748

Trust: 1.0

db:VUPENid:ADV-2006-5146

Trust: 1.0

db:VUPENid:ADV-2006-3899

Trust: 1.0

db:VUPENid:ADV-2006-4207

Trust: 1.0

db:VUPENid:ADV-2006-3730

Trust: 1.0

db:VUPENid:ADV-2006-4744

Trust: 1.0

db:VUPENid:ADV-2007-1401

Trust: 1.0

db:VUPENid:ADV-2006-3793

Trust: 1.0

db:VUPENid:ADV-2006-3453

Trust: 1.0

db:VUPENid:ADV-2007-1945

Trust: 1.0

db:VUPENid:ADV-2006-4205

Trust: 1.0

db:VUPENid:ADV-2007-2315

Trust: 1.0

db:VUPENid:ADV-2007-1815

Trust: 1.0

db:VUPENid:ADV-2007-0254

Trust: 1.0

db:VUPENid:ADV-2006-3566

Trust: 1.0

db:VUPENid:ADV-2006-4586

Trust: 1.0

db:VUPENid:ADV-2010-0366

Trust: 1.0

db:VUPENid:ADV-2006-4327

Trust: 1.0

db:SECUNIAid:21852

Trust: 1.0

db:SECUNIAid:25284

Trust: 1.0

db:SECUNIAid:21767

Trust: 1.0

db:SECUNIAid:23155

Trust: 1.0

db:SECUNIAid:22066

Trust: 1.0

db:SECUNIAid:24099

Trust: 1.0

db:SECUNIAid:22446

Trust: 1.0

db:SECUNIAid:22585

Trust: 1.0

db:SECUNIAid:21906

Trust: 1.0

db:SECUNIAid:22799

Trust: 1.0

db:SECUNIAid:23915

Trust: 1.0

db:SECUNIAid:31492

Trust: 1.0

db:SECUNIAid:21873

Trust: 1.0

db:SECUNIAid:22758

Trust: 1.0

db:SECUNIAid:22936

Trust: 1.0

db:SECUNIAid:26329

Trust: 1.0

db:SECUNIAid:23455

Trust: 1.0

db:SECUNIAid:22689

Trust: 1.0

db:SECUNIAid:22232

Trust: 1.0

db:SECUNIAid:21927

Trust: 1.0

db:SECUNIAid:21870

Trust: 1.0

db:SECUNIAid:21823

Trust: 1.0

db:SECUNIAid:24930

Trust: 1.0

db:SECUNIAid:22932

Trust: 1.0

db:SECUNIAid:22934

Trust: 1.0

db:SECUNIAid:22938

Trust: 1.0

db:SECUNIAid:23841

Trust: 1.0

db:SECUNIAid:38567

Trust: 1.0

db:SECUNIAid:21776

Trust: 1.0

db:SECUNIAid:22671

Trust: 1.0

db:SECUNIAid:22733

Trust: 1.0

db:SECUNIAid:22949

Trust: 1.0

db:SECUNIAid:21791

Trust: 1.0

db:SECUNIAid:22044

Trust: 1.0

db:SECUNIAid:22545

Trust: 1.0

db:SECUNIAid:28115

Trust: 1.0

db:SECUNIAid:22036

Trust: 1.0

db:SECUNIAid:24950

Trust: 1.0

db:SECUNIAid:22226

Trust: 1.0

db:SECUNIAid:22948

Trust: 1.0

db:SECUNIAid:21778

Trust: 1.0

db:SECUNIAid:25649

Trust: 1.0

db:SECUNIAid:21785

Trust: 1.0

db:SECUNIAid:22325

Trust: 1.0

db:SECUNIAid:23794

Trust: 1.0

db:SECUNIAid:22937

Trust: 1.0

db:SECUNIAid:22711

Trust: 1.0

db:SECUNIAid:21930

Trust: 1.0

db:SECUNIAid:21982

Trust: 1.0

db:SECUNIAid:22940

Trust: 1.0

db:SECUNIAid:22523

Trust: 1.0

db:SECUNIAid:26893

Trust: 1.0

db:SECUNIAid:41818

Trust: 1.0

db:SECUNIAid:21846

Trust: 1.0

db:SECUNIAid:22161

Trust: 1.0

db:SECUNIAid:22509

Trust: 1.0

db:SECUNIAid:25399

Trust: 1.0

db:SECUNIAid:60799

Trust: 1.0

db:SECUNIAid:21812

Trust: 1.0

db:SECUNIAid:23680

Trust: 1.0

db:SECUNIAid:22513

Trust: 1.0

db:SECUNIAid:22939

Trust: 1.0

db:SECTRACKid:1016791

Trust: 1.0

db:SECTRACKid:1017522

Trust: 1.0

db:BIDid:28276

Trust: 1.0

db:OSVDBid:28549

Trust: 1.0

db:BIDid:20246

Trust: 0.8

db:CERT/CCid:VU#386964

Trust: 0.8

db:SECUNIAid:22207

Trust: 0.8

db:SECUNIAid:22212

Trust: 0.8

db:SECUNIAid:22116

Trust: 0.8

db:SECUNIAid:22216

Trust: 0.8

db:SECUNIAid:22220

Trust: 0.8

db:SECUNIAid:22330

Trust: 0.8

db:SECUNIAid:22130

Trust: 0.8

db:SECUNIAid:22240

Trust: 0.8

db:SECUNIAid:22165

Trust: 0.8

db:SECUNIAid:22166

Trust: 0.8

db:SECUNIAid:22172

Trust: 0.8

db:SECUNIAid:22186

Trust: 0.8

db:SECUNIAid:22193

Trust: 0.8

db:SECUNIAid:22094

Trust: 0.8

db:BIDid:20249

Trust: 0.8

db:SECTRACKid:1016943

Trust: 0.8

db:XFid:29237

Trust: 0.8

db:CERT/CCid:VU#547300

Trust: 0.8

db:SECUNIAid:27421

Trust: 0.8

db:XFid:28755

Trust: 0.8

db:JVNDBid:JVNDB-2007-000772

Trust: 0.8

db:USCERTid:SA06-333A

Trust: 0.8

db:USCERTid:TA07-017A

Trust: 0.8

db:JVNDBid:JVNDB-2006-000532

Trust: 0.8

db:CERT/CCid:VU#594904

Trust: 0.3

db:PACKETSTORMid:51021

Trust: 0.1

db:PACKETSTORMid:53566

Trust: 0.1

db:PACKETSTORMid:49749

Trust: 0.1

db:PACKETSTORMid:56053

Trust: 0.1

db:PACKETSTORMid:53990

Trust: 0.1

db:PACKETSTORMid:51167

Trust: 0.1

db:PACKETSTORMid:86249

Trust: 0.1

db:PACKETSTORMid:51624

Trust: 0.1

sources: CERT/CC: VU#386964 // CERT/CC: VU#221788 // CERT/CC: VU#845620 // CERT/CC: VU#547300 // BID: 19849 // BID: 22083 // PACKETSTORM: 51021 // PACKETSTORM: 53566 // PACKETSTORM: 49749 // PACKETSTORM: 56053 // PACKETSTORM: 53990 // PACKETSTORM: 51167 // PACKETSTORM: 86249 // PACKETSTORM: 51624 // JVNDB: JVNDB-2012-000079 // JVNDB: JVNDB-2007-000772 // JVNDB: JVNDB-2006-000532 // NVD: CVE-2006-4339

REFERENCES

url:http://www.securityfocus.com/bid/22083

Trust: 3.4

url:http://www.kb.cert.org/vuls/id/845620

Trust: 2.9

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-4339

Trust: 2.8

url:http://www.imc.org/ietf-openpgp/mail-archive/msg14307.html

Trust: 2.2

url:http://www.matasano.com/log/469/many-rsa-signatures-may-be-forgeable-in-openssl-and-elsewhere/

Trust: 1.8

url:http://jvn.jp/en/jp/jvn51615542/index.html

Trust: 1.8

url:http://www.securityfocus.com/bid/19849

Trust: 1.8

url:http://www.us-cert.gov/cas/techalerts/ta06-333a.html

Trust: 1.8

url:http://secunia.com/advisories/21709/

Trust: 1.7

url:http://www.openssl.org/news/secadv_20060928.txt

Trust: 1.6

url:http://secunia.com/advisories/23280/

Trust: 1.6

url:http://secunia.com/advisories/23309/

Trust: 1.6

url:http://docs.info.apple.com/article.html?artnum=307177

Trust: 1.6

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2006-4339

Trust: 1.6

url:http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujan2007.html

Trust: 1.4

url:http://www.openssl.org/news/secadv_20060905.txt

Trust: 1.4

url:http://www.openoffice.org/security/cves/cve-2006-4339.html

Trust: 1.4

url:http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&id=3117

Trust: 1.3

url:http://docs.info.apple.com/article.html?artnum=304829

Trust: 1.3

url:http://support.avaya.com/elmodocs2/security/asa-2006-188.htm

Trust: 1.3

url:http://www.cisco.com/warp/public/707/cisco-sr-20061108-openssl.shtml

Trust: 1.3

url:http://support.attachmate.com/techdocs/2137.html

Trust: 1.3

url:http://www.bluecoat.com/support/knowledge/openssl_rsa_signature_forgery.html

Trust: 1.3

url:http://www.vmware.com/support/server/doc/releasenotes_server.html

Trust: 1.3

url:https://secure-support.novell.com/kanisaplatform/publishing/41/3143224_f.sal_public.html

Trust: 1.3

url:http://sunsolve.sun.com/search/document.do?assetkey=1-66-200708-1

Trust: 1.3

url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-102759-1

Trust: 1.3

url:http://www.sybase.com/detail?id=1047991

Trust: 1.3

url:http://www.red-database-security.com/advisory/oracle_sql_injection_dbms_aq_inv.html

Trust: 1.1

url:http://www.red-database-security.com/advisory/oracle_cpu_jan_2007.html

Trust: 1.1

url:http://www.vmware.com/support/esx2/doc/esx-202-200612-patch.html

Trust: 1.1

url:http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html

Trust: 1.1

url:http://www.vmware.com/support/esx25/doc/esx-254-200612-patch.html

Trust: 1.1

url:http://www.vmware.com/support/esx21/doc/esx-213-200612-patch.html

Trust: 1.1

url:http://www.vmware.com/support/esx25/doc/esx-253-200612-patch.html

Trust: 1.1

url:http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html

Trust: 1.1

url:http://secunia.com/advisories/22939

Trust: 1.0

url:https://issues.rpath.com/browse/rpl-1633

Trust: 1.0

url:http://securitytracker.com/id?1016791

Trust: 1.0

url:http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html

Trust: 1.0

url:http://www.opera.com/support/search/supsearch.dml?index=845

Trust: 1.0

url:http://www.vupen.com/english/advisories/2006/3453

Trust: 1.0

url:http://www.osvdb.org/28549

Trust: 1.0

url:http://www.vupen.com/english/advisories/2007/0254

Trust: 1.0

url:http://itrc.hp.com/service/cki/docdisplay.do?docid=c00849540

Trust: 1.0

url:http://secunia.com/advisories/23841

Trust: 1.0

url:http://secunia.com/advisories/60799

Trust: 1.0

url:http://www.openpkg.com/security/advisories/openpkg-sa-2006.018.html

Trust: 1.0

url:http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?lang=en&cc=us&objectid=c01070495

Trust: 1.0

url:http://www.securityfocus.com/archive/1/450327/100/0/threaded

Trust: 1.0

url:http://secunia.com/advisories/22161

Trust: 1.0

url:http://secunia.com/advisories/23455

Trust: 1.0

url:http://www.vupen.com/english/advisories/2006/4206

Trust: 1.0

url:http://secunia.com/advisories/22585

Trust: 1.0

url:http://secunia.com/advisories/22044

Trust: 1.0

url:http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html

Trust: 1.0

url:http://secunia.com/advisories/21791

Trust: 1.0

url:http://secunia.com/advisories/22446

Trust: 1.0

url:http://support.attachmate.com/techdocs/2127.html

Trust: 1.0

url:http://secunia.com/advisories/21709

Trust: 1.0

url:http://www.us.debian.org/security/2006/dsa-1173

Trust: 1.0

url:http://lists.apple.com/archives/security-announce/2006/nov/msg00001.html

Trust: 1.0

url:http://openvpn.net/changelog.html

Trust: 1.0

url:http://lists.vmware.com/pipermail/security-announce/2008/000008.html

Trust: 1.0

url:http://www.vupen.com/english/advisories/2006/4417

Trust: 1.0

url:http://secunia.com/advisories/22758

Trust: 1.0

url:http://secunia.com/advisories/22284

Trust: 1.0

url:http://www.openbsd.org/errata.html

Trust: 1.0

url:http://www.securityfocus.com/archive/1/489739/100/0/threaded

Trust: 1.0

url:http://secunia.com/advisories/21870

Trust: 1.0

url:http://www.vupen.com/english/advisories/2006/4744

Trust: 1.0

url:http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html

Trust: 1.0

url:http://secunia.com/advisories/22226

Trust: 1.0

url:http://www.vmware.com/support/player2/doc/releasenotes_player2.html

Trust: 1.0

url:http://secunia.com/advisories/23155

Trust: 1.0

url:https://www2.itrc.hp.com/service/cki/docdisplay.do?docid=c00967144

Trust: 1.0

url:http://secunia.com/advisories/21852

Trust: 1.0

url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-102744-1

Trust: 1.0

url:http://secunia.com/advisories/21906

Trust: 1.0

url:http://www.vupen.com/english/advisories/2010/0366

Trust: 1.0

url:http://secunia.com/advisories/21930

Trust: 1.0

url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-102722-1

Trust: 1.0

url:http://www.vupen.com/english/advisories/2006/3793

Trust: 1.0

url:http://secunia.com/advisories/22733

Trust: 1.0

url:http://www.novell.com/linux/security/advisories/2006_61_opera.html

Trust: 1.0

url:http://secunia.com/advisories/22066

Trust: 1.0

url:http://sunsolve.sun.com/search/document.do?assetkey=1-77-1000148.1-1

Trust: 1.0

url:http://www.redhat.com/support/errata/rhsa-2008-0629.html

Trust: 1.0

url:http://www.vupen.com/english/advisories/2006/3936

Trust: 1.0

url:http://secunia.com/advisories/22937

Trust: 1.0

url:http://secunia.com/advisories/26893

Trust: 1.0

url:ftp://patches.sgi.com/support/free/security/advisories/20060901-01-p.asc

Trust: 1.0

url:http://secunia.com/advisories/22938

Trust: 1.0

url:http://www.mandriva.com/security/advisories?name=mdksa-2006:207

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=130497311408250&w=2

Trust: 1.0

url:http://secunia.com/advisories/21812

Trust: 1.0

url:http://secunia.com/advisories/41818

Trust: 1.0

url:http://secunia.com/advisories/22545

Trust: 1.0

url:http://www.vupen.com/english/advisories/2007/1815

Trust: 1.0

url:http://www.securityfocus.com/bid/28276

Trust: 1.0

url:http://marc.info/?l=bind-announce&m=116253119512445&w=2

Trust: 1.0

url:http://www.vupen.com/english/advisories/2007/2783

Trust: 1.0

url:http://secunia.com/advisories/24099

Trust: 1.0

url:http://www.serv-u.com/releasenotes/

Trust: 1.0

url:http://secunia.com/advisories/21846

Trust: 1.0

url:http://www.novell.com/linux/security/advisories/2007_10_ibmjava.html

Trust: 1.0

url:http://www.gentoo.org/security/en/glsa/glsa-200610-06.xml

Trust: 1.0

url:http://secunia.com/advisories/31492

Trust: 1.0

url:http://www.vupen.com/english/advisories/2006/4327

Trust: 1.0

url:http://www.cisco.com/en/us/products/hw/contnetw/ps4162/tsd_products_security_response09186a008077af1b.html

Trust: 1.0

url:http://secunia.com/advisories/21776

Trust: 1.0

url:http://www.securityfocus.com/archive/1/445231/100/0/threaded

Trust: 1.0

url:http://lists.apple.com/archives/security-announce/2007/dec/msg00001.html

Trust: 1.0

url:http://www.vupen.com/english/advisories/2007/1401

Trust: 1.0

url:http://secunia.com/advisories/22523

Trust: 1.0

url:http://secunia.com/advisories/38567

Trust: 1.0

url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-102657-1

Trust: 1.0

url:http://dev2dev.bea.com/pub/advisory/238

Trust: 1.0

url:http://www.mandriva.com/security/advisories?name=mdksa-2006:161

Trust: 1.0

url:http://secunia.com/advisories/28115

Trust: 1.0

url:http://www.vupen.com/english/advisories/2006/5146

Trust: 1.0

url:http://www.debian.org/security/2006/dsa-1174

Trust: 1.0

url:http://secunia.com/advisories/21823

Trust: 1.0

url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-102696-1

Trust: 1.0

url:http://secunia.com/advisories/22232

Trust: 1.0

url:http://secunia.com/advisories/21785

Trust: 1.0

url:http://secunia.com/advisories/22932

Trust: 1.0

url:http://secunia.com/advisories/22036

Trust: 1.0

url:http://secunia.com/advisories/22949

Trust: 1.0

url:http://www.vupen.com/english/advisories/2007/1945

Trust: 1.0

url:http://secunia.com/advisories/22513

Trust: 1.0

url:http://secunia.com/advisories/25284

Trust: 1.0

url:http://secunia.com/advisories/25399

Trust: 1.0

url:http://securitytracker.com/id?1017522

Trust: 1.0

url:http://www.vupen.com/english/advisories/2006/4207

Trust: 1.0

url:http://www.vupen.com/english/advisories/2006/4216

Trust: 1.0

url:https://issues.rpath.com/browse/rpl-616

Trust: 1.0

url:http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?objectid=c01118771

Trust: 1.0

url:http://www.vupen.com/english/advisories/2007/2163

Trust: 1.0

url:http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.605306

Trust: 1.0

url:http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.566955

Trust: 1.0

url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-102648-1

Trust: 1.0

url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-102686-1

Trust: 1.0

url:http://www.mandriva.com/security/advisories?name=mdksa-2006:177

Trust: 1.0

url:http://secunia.com/advisories/22259

Trust: 1.0

url:http://secunia.com/advisories/22260

Trust: 1.0

url:http://secunia.com/advisories/21873

Trust: 1.0

url:http://www.vupen.com/english/advisories/2007/4224

Trust: 1.0

url:http://www.vupen.com/english/advisories/2008/0905/references

Trust: 1.0

url:http://secunia.com/advisories/21927

Trust: 1.0

url:http://secunia.com/advisories/23680

Trust: 1.0

url:http://www1.itrc.hp.com/service/cki/docdisplay.do?docid=c00771742

Trust: 1.0

url:http://secunia.com/advisories/21982

Trust: 1.0

url:http://www.mandriva.com/security/advisories?name=mdksa-2006:178

Trust: 1.0

url:http://secunia.com/advisories/24930

Trust: 1.0

url:http://www.vupen.com/english/advisories/2007/0343

Trust: 1.0

url:http://secunia.com/advisories/21767

Trust: 1.0

url:http://secunia.com/advisories/22799

Trust: 1.0

url:http://www.oracle.com/technetwork/topics/security/cpujan2007-101493.html

Trust: 1.0

url:http://www.vupen.com/english/advisories/2006/3748

Trust: 1.0

url:http://sunsolve.sun.com/search/document.do?assetkey=1-66-201247-1

Trust: 1.0

url:http://secunia.com/advisories/23915

Trust: 1.0

url:http://www.vupen.com/english/advisories/2006/4586

Trust: 1.0

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/28755

Trust: 1.0

url:http://www.vupen.com/english/advisories/2006/3899

Trust: 1.0

url:http://secunia.com/advisories/21778

Trust: 1.0

url:http://secunia.com/advisories/22711

Trust: 1.0

url:http://secunia.com/advisories/22940

Trust: 1.0

url:http://secunia.com/advisories/22689

Trust: 1.0

url:http://secunia.com/advisories/38568

Trust: 1.0

url:http://www.novell.com/linux/security/advisories/2006_26_sr.html

Trust: 1.0

url:http://www.redhat.com/support/errata/rhsa-2007-0073.html

Trust: 1.0

url:http://www.vmware.com/support/player/doc/releasenotes_player.html

Trust: 1.0

url:http://www.novell.com/linux/security/advisories/2006_55_ssl.html

Trust: 1.0

url:http://secunia.com/advisories/22948

Trust: 1.0

url:http://secunia.com/advisories/22671

Trust: 1.0

url:http://www.redhat.com/support/errata/rhsa-2006-0661.html

Trust: 1.0

url:http://www.securityfocus.com/archive/1/445822/100/0/threaded

Trust: 1.0

url:http://secunia.com/advisories/25649

Trust: 1.0

url:http://www.vmware.com/security/advisories/vmsa-2008-0005.html

Trust: 1.0

url:http://www.vupen.com/english/advisories/2006/3566

Trust: 1.0

url:http://www.arkoon.fr/upload/alertes/40ak-2006-04-fr-1.1_ssl360_openssl_rsa.pdf

Trust: 1.0

url:http://secunia.com/advisories/22325

Trust: 1.0

url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-102656-1

Trust: 1.0

url:http://www.vupen.com/english/advisories/2006/4205

Trust: 1.0

url:http://www.vupen.com/english/advisories/2006/4366

Trust: 1.0

url:http://secunia.com/advisories/24950

Trust: 1.0

url:http://security.freebsd.org/advisories/freebsd-sa-06:19.openssl.asc

Trust: 1.0

url:http://www.vupen.com/english/advisories/2007/2315

Trust: 1.0

url:http://www.securityfocus.com/archive/1/456546/100/200/threaded

Trust: 1.0

url:http://www.vupen.com/english/advisories/2006/4750

Trust: 1.0

url:http://www.redhat.com/support/errata/rhsa-2007-0072.html

Trust: 1.0

url:http://security.gentoo.org/glsa/glsa-200609-05.xml

Trust: 1.0

url:http://www.openpkg.org/security/advisories/openpkg-sa-2006.029-bind.html

Trust: 1.0

url:http://jvndb.jvn.jp/ja/contents/2012/jvndb-2012-000079.html

Trust: 1.0

url:http://www.redhat.com/support/errata/rhsa-2007-0062.html

Trust: 1.0

url:http://www.vupen.com/english/advisories/2006/3730

Trust: 1.0

url:http://secunia.com/advisories/22509

Trust: 1.0

url:http://secunia.com/advisories/22934

Trust: 1.0

url:http://secunia.com/advisories/22936

Trust: 1.0

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a11656

Trust: 1.0

url:http://security.gentoo.org/glsa/glsa-200609-18.xml

Trust: 1.0

url:http://www.gentoo.org/security/en/glsa/glsa-201408-19.xml

Trust: 1.0

url:http://support.attachmate.com/techdocs/2128.html

Trust: 1.0

url:http://www.ubuntu.com/usn/usn-339-1

Trust: 1.0

url:http://www.vupen.com/english/advisories/2006/4329

Trust: 1.0

url:http://secunia.com/advisories/23794

Trust: 1.0

url:http://secunia.com/advisories/26329

Trust: 1.0

url:http://sunsolve.sun.com/search/document.do?assetkey=1-66-201534-1

Trust: 1.0

url:http://jvn.jp/cert/jvnvu%23386964/index.html

Trust: 0.8

url:http://www.securityfocus.com/bid/20246

Trust: 0.8

url:http://www.openssl.org/news/secadv_20060905.txt

Trust: 0.8

url:http://www.rsasecurity.com/rsalabs/node.asp?id=2125

Trust: 0.8

url:http://www.ietf.org/rfc/rfc3447.txt

Trust: 0.8

url:http://jvn.jp/cert/jvnvu%23547300/index.html

Trust: 0.8

url:http://lists.grok.org.uk/pipermail/full-disclosure/2006-september/049715.html

Trust: 0.8

url:https://issues.rpath.com/browse/rpl-613

Trust: 0.8

url:http://www.openssl.org/news/secadv_20060928.txt

Trust: 0.8

url:http://kolab.org/security/kolab-vendor-notice-11.txt

Trust: 0.8

url:http://openvpn.net/changelog.html

Trust: 0.8

url:http://www.serv-u.com/releasenotes/

Trust: 0.8

url:http://openbsd.org/errata.html#openssl2

Trust: 0.8

url:http://www.securityfocus.com/bid/20249

Trust: 0.8

url:http://securitytracker.com/id?1016943

Trust: 0.8

url:http://secunia.com/advisories/22130

Trust: 0.8

url:http://secunia.com/advisories/22094

Trust: 0.8

url:http://secunia.com/advisories/22165

Trust: 0.8

url:http://secunia.com/advisories/22186

Trust: 0.8

url:http://secunia.com/advisories/22193

Trust: 0.8

url:http://secunia.com/advisories/22207

Trust: 0.8

url:http://secunia.com/advisories/22259

Trust: 0.8

url:http://secunia.com/advisories/22260

Trust: 0.8

url:http://secunia.com/advisories/22166

Trust: 0.8

url:http://secunia.com/advisories/22172

Trust: 0.8

url:http://secunia.com/advisories/22212

Trust: 0.8

url:http://secunia.com/advisories/22240

Trust: 0.8

url:http://secunia.com/advisories/22216

Trust: 0.8

url:http://secunia.com/advisories/22116

Trust: 0.8

url:http://secunia.com/advisories/22220

Trust: 0.8

url:http://secunia.com/advisories/22284

Trust: 0.8

url:http://secunia.com/advisories/22330

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/29237

Trust: 0.8

url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-102668-1

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-5810

Trust: 0.8

url:http://www.frsirt.com/english/advisories/2007/3666

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/28755

Trust: 0.8

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-5810

Trust: 0.8

url:http://secunia.com/advisories/27421

Trust: 0.8

url:http://www.frsirt.com/english/advisories/2006/3453

Trust: 0.8

url:http://www.frsirt.com/english/advisories/2006/4032

Trust: 0.8

url:http://jvn.jp/cert/jvnta07-017a/

Trust: 0.8

url:http://jvn.jp/cert/jvnvu%23845620

Trust: 0.8

url:http://jvn.jp/cert/jvnta06-333a/index.html

Trust: 0.8

url:http://jvn.jp/tr/trta06-333a

Trust: 0.8

url:http://jvn.jp/tr/trta07-017a

Trust: 0.8

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2006-4339

Trust: 0.8

url:http://www.us-cert.gov/cas/alerts/sa06-333a.html

Trust: 0.8

url:http://www.us-cert.gov/cas/techalerts/ta07-017a.html

Trust: 0.8

url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-102656-1&searchclause=

Trust: 0.6

url:http://rhn.redhat.com/errata/rhsa-2008-0264.html

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2006-4339

Trust: 0.5

url:http://freshmeat.net/projects/bouncycastlecryptoapi/releases/265580

Trust: 0.3

url:http://support.avaya.com/elmodocs2/security/asa-2006-196.htm

Trust: 0.3

url:http://support.avaya.com/elmodocs2/security/asa-2006-224.htm

Trust: 0.3

url:http://support.avaya.com/elmodocs2/security/asa-2006-246.htm

Trust: 0.3

url:http://www.isc.org/index.pl?/sw/bind/bind9.4-beta.php

Trust: 0.3

url:http://marc.theaimsgroup.com/?l=bind-announce&m=116253119512445&w=2

Trust: 0.3

url:http://www.bluecoat.com

Trust: 0.3

url:http://www.cisco.com/warp/public/707/cisco-air-20061108-openssl.shtml

Trust: 0.3

url:http://www.cdc.informatik.tu-darmstadt.de/securebrowser/

Trust: 0.3

url:http://www.ipcop.org/modules.php?op=modload&name=news&file=article&sid=31&mode=thread&order=0&thold=0

Trust: 0.3

url:http://www.mozilla.org/security/announce/2006/mfsa2006-60.html

Trust: 0.3

url:http://www.mozilla.org/security/announce/2006/mfsa2006-66.html

Trust: 0.3

url:ftp://ftp.netbsd.org/pub/netbsd/security/advisories/netbsd-sa2006-023.txt.asc

Trust: 0.3

url:http://www.ingate.com/relnote-451.php

Trust: 0.3

url:http://rhn.redhat.com/errata/rhsa-2006-0735.html

Trust: 0.3

url:http://rhn.redhat.com/errata/rhsa-2006-0661.html

Trust: 0.3

url:http://rhn.redhat.com/errata/rhsa-2006-0675.html

Trust: 0.3

url:http://rhn.redhat.com/errata/rhsa-2006-0676.html

Trust: 0.3

url:http://rhn.redhat.com/errata/rhsa-2006-0677.html

Trust: 0.3

url:http://rhn.redhat.com/errata/rhsa-2006-0733.html

Trust: 0.3

url:http://rhn.redhat.com/errata/rhsa-2006-0734.html

Trust: 0.3

url:http://www.ssh.com/company/news/2006/english/security/article/786/

Trust: 0.3

url:http://www.arkoon.fr/upload/alertes/44ak-2006-04-en-1.1_ssl360_openssl_rsa.pdf

Trust: 0.3

url:http://www1.vandyke.com/support/advisory/2007/01/845620.html

Trust: 0.3

url:http://www.slackware.com/security/list.php?l=slackware-security&y=2006

Trust: 0.3

url:http://www.cyberguard.info/snapgear/releases.html

Trust: 0.3

url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-102657-1&searchclause=

Trust: 0.3

url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-102696-1&searchclause=

Trust: 0.3

url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-102722-1&searchclause=

Trust: 0.3

url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-102744-1&searchclause=

Trust: 0.3

url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-102648-1&searchclause=

Trust: 0.3

url:/archive/1/446038

Trust: 0.3

url:http://support.avaya.com/elmodocs2/security/asa-2007-091.htm

Trust: 0.3

url:http://support.avaya.com/elmodocs2/security/asa-2006-250.htm

Trust: 0.3

url:https://www.itrc.hp.com/service/cki/docdisplay.do?docid=emr_na-c02475053

Trust: 0.3

url:http://www2.itrc.hp.com/service/cki/docdisplay.do?admit=-1335382922+1174502331230+28353475&docid=c00774579

Trust: 0.3

url:http://lists.grok.org.uk/pipermail/full-disclosure/2007-january/051708.html

Trust: 0.3

url:https://rhn.redhat.com/errata/rhsa-2007-0062.html

Trust: 0.3

url:http://rhn.redhat.com/errata/rhsa-2007-0072.html

Trust: 0.3

url:http://rhn.redhat.com/errata/rhsa-2008-0525.html

Trust: 0.3

url:http://rhn.redhat.com/errata/rhsa-2008-0629.html

Trust: 0.3

url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-102759-1&searchclause=

Trust: 0.3

url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-102781-1&searchclause=

Trust: 0.3

url:http://www.kb.cert.org/vuls/id/594904

Trust: 0.3

url:http://www.red-database-security.com/advisory/oracle_buffer_overflow_ons.html

Trust: 0.3

url:http://www.red-database-security.com/advisory/oracle_xmldb_css2.html

Trust: 0.3

url:http://www.integrigy.com/security-resources/analysis/oracle-cpu-january-2007/view

Trust: 0.3

url:http://www.integrigy.com/security-resources/analysis/cpu-january-2007-tech-matrix/view

Trust: 0.3

url:http://www.appsecinc.com/resources/alerts/oracle/2007-01.shtml

Trust: 0.3

url:http://www.appsecinc.com/resources/alerts/oracle/2007-03.shtml

Trust: 0.3

url:http://www.appsecinc.com/resources/alerts/oracle/2007-06.shtml

Trust: 0.3

url:http://www.appsecinc.com/resources/alerts/oracle/2007-02.shtml

Trust: 0.3

url:http://www.oracle.com/index.html

Trust: 0.3

url:https://www.it-isac.org/postings/cyber/alertdetail.php?id=4092

Trust: 0.3

url:http://www.kb.cert.org/vuls/id/221788

Trust: 0.3

url:/archive/1/457193

Trust: 0.3

url:/archive/1/464470

Trust: 0.3

url:/archive/1/458657

Trust: 0.3

url:/archive/1/458036

Trust: 0.3

url:/archive/1/458006

Trust: 0.3

url:/archive/1/458037

Trust: 0.3

url:/archive/1/458005

Trust: 0.3

url:/archive/1/458041

Trust: 0.3

url:/archive/1/458038

Trust: 0.3

url:/archive/1/458475

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2006-2937

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2006-2940

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2006-3738

Trust: 0.3

url:http://www.itrc.hp.com/service/cki/secbullarchive.do

Trust: 0.3

url:http://h30046.www3.hp.com/subsignin.php

Trust: 0.3

url:http://security.gentoo.org/

Trust: 0.2

url:http://security.gentoo.org/glsa/glsa-200610-06.xml

Trust: 0.2

url:http://bugs.gentoo.org.

Trust: 0.2

url:http://creativecommons.org/licenses/by-sa/2.5

Trust: 0.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-4340

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2006-4343

Trust: 0.2

url:http://h30046.www3.hp.com/driveralertprofile.php?regioncode=na&langcode=useng&jumpid=in_sc-gen__driveritrc&topiccode=itrc

Trust: 0.2

url:http://software.hp.com/portal/swdepot/displayproductinfo.do?productnumber=b6834aa

Trust: 0.2

url:http://kb.vmware.com/kb/9986131

Trust: 0.1

url:http://secunia.com/

Trust: 0.1

url:http://www.vmware.com/vmtn/technology/security/security_response.html

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-2940

Trust: 0.1

url:http://www.vmware.com/security

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-3589

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2006-3589

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-4980

Trust: 0.1

url:http://lists.grok.org.uk/full-disclosure-charter.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2006-4980

Trust: 0.1

url:http://kb.vmware.com/kb/3069097

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-4343

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-3738

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-2937

Trust: 0.1

url:http://www.openssl.org/source/

Trust: 0.1

url:http://www.openssl.org/news/patch-cve-2006-4339.txt

Trust: 0.1

url:http://www.openssl.org/source/mirror.html):

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2007-0494

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2007-0493

Trust: 0.1

url:http://www.itrc.hp.com/service/patch/patchdetail.do?patchid=t64kit1001167-v51bb27-es-20070321

Trust: 0.1

url:http://www.itrc.hp.com/service/patch/patchdetail.do?patchid=t64kit1001163-v51bb26-es-20070315

Trust: 0.1

url:http://h30097.www3.hp.com/cma/patches.html

Trust: 0.1

url:http://www.itrc.hp.com/service/patch/patchdetail.do?patchid=duxkit1001165-v40fb22-es-20070316

Trust: 0.1

url:http://www.itrc.hp.com/service/patch/patchdetail.do?patchid=t64kit1001166-v40gb22-es-20070316

Trust: 0.1

url:http://www.itrc.hp.com/service/patch/patchdetail.do?patchid=t64kit1001160-v51ab24-es-20070314

Trust: 0.1

url:http://h20293.www2.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayproductinfo.pl?productnumber=hpuxwssuite

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2005-2969

Trust: 0.1

url:http://www.openoffice.org/security/cves/cve-2009-2493.html

Trust: 0.1

url:http://www.openoffice.org/security/cves/cve-2009-0217.html

Trust: 0.1

url:http://secunia.com/advisories/38568/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/advisories/35854/

Trust: 0.1

url:http://secunia.com/blog/71/

Trust: 0.1

url:http://www.openoffice.org/security/cves/cve-2009-3301-3302.html

Trust: 0.1

url:http://www.openoffice.org/security/cves/cve-2009-2950.html

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://www.openoffice.org/security/cves/cve-2009-2949.html

Trust: 0.1

url:http://secunia.com/advisories/35967/

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

url:http://h30046.www3.hp.com/driveralertprofile.php?regioncode=na&

Trust: 0.1

url:http://itrc.hp.com

Trust: 0.1

sources: CERT/CC: VU#386964 // CERT/CC: VU#221788 // CERT/CC: VU#845620 // CERT/CC: VU#547300 // BID: 19849 // BID: 22083 // PACKETSTORM: 51021 // PACKETSTORM: 53566 // PACKETSTORM: 49749 // PACKETSTORM: 56053 // PACKETSTORM: 53990 // PACKETSTORM: 51167 // PACKETSTORM: 86249 // PACKETSTORM: 51624 // JVNDB: JVNDB-2012-000079 // JVNDB: JVNDB-2007-000772 // JVNDB: JVNDB-2006-000532 // NVD: CVE-2006-4339

CREDITS

Daniel Bleichenbacher reported this issue to the vendor.

Trust: 0.3

sources: BID: 19849

SOURCES

db:CERT/CCid:VU#386964
db:CERT/CCid:VU#221788
db:CERT/CCid:VU#845620
db:CERT/CCid:VU#547300
db:BIDid:19849
db:BIDid:22083
db:PACKETSTORMid:51021
db:PACKETSTORMid:53566
db:PACKETSTORMid:49749
db:PACKETSTORMid:56053
db:PACKETSTORMid:53990
db:PACKETSTORMid:51167
db:PACKETSTORMid:86249
db:PACKETSTORMid:51624
db:JVNDBid:JVNDB-2012-000079
db:JVNDBid:JVNDB-2007-000772
db:JVNDBid:JVNDB-2006-000532
db:NVDid:CVE-2006-4339

LAST UPDATE DATE

2025-10-19T20:02:16.944000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#386964date:2011-07-22T00:00:00
db:CERT/CCid:VU#221788date:2007-01-17T00:00:00
db:CERT/CCid:VU#845620date:2007-02-08T00:00:00
db:CERT/CCid:VU#547300date:2011-07-22T00:00:00
db:BIDid:19849date:2015-03-19T08:19:00
db:BIDid:22083date:2008-05-20T23:05:00
db:JVNDBid:JVNDB-2012-000079date:2014-05-23T00:00:00
db:JVNDBid:JVNDB-2007-000772date:2014-05-23T00:00:00
db:JVNDBid:JVNDB-2006-000532date:2014-05-23T00:00:00
db:NVDid:CVE-2006-4339date:2025-04-03T01:03:51.193

SOURCES RELEASE DATE

db:CERT/CCid:VU#386964date:2006-09-28T00:00:00
db:CERT/CCid:VU#221788date:2007-01-17T00:00:00
db:CERT/CCid:VU#845620date:2006-09-11T00:00:00
db:CERT/CCid:VU#547300date:2006-09-28T00:00:00
db:BIDid:19849date:2006-09-05T00:00:00
db:BIDid:22083date:2007-01-16T00:00:00
db:PACKETSTORMid:51021date:2006-10-20T22:34:17
db:PACKETSTORMid:53566date:2007-01-13T22:56:30
db:PACKETSTORMid:49749date:2006-09-07T08:41:36
db:PACKETSTORMid:56053date:2007-04-19T00:58:08
db:PACKETSTORMid:53990date:2007-01-27T02:35:42
db:PACKETSTORMid:51167date:2006-10-20T22:34:17
db:PACKETSTORMid:86249date:2010-02-12T15:35:11
db:PACKETSTORMid:51624date:2006-11-03T02:10:30
db:JVNDBid:JVNDB-2012-000079date:2012-08-30T00:00:00
db:JVNDBid:JVNDB-2007-000772date:2008-05-21T00:00:00
db:JVNDBid:JVNDB-2006-000532date:2007-04-01T00:00:00
db:NVDid:CVE-2006-4339date:2006-09-05T17:04:00