ID

VAR-200609-1512


CVE

CVE-2006-4339


TITLE

OpenSSL SSLv2 client code fails to properly check for NULL

Trust: 0.8

sources: CERT/CC: VU#386964

DESCRIPTION

OpenSSL before 0.9.7, 0.9.7 before 0.9.7k, and 0.9.8 before 0.9.8c, when using an RSA key with exponent 3, removes PKCS-1 padding before generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents OpenSSL from correctly verifying X.509 and other certificates that use PKCS #1. This vulnerability may allow an attacker to forge RSA signatures. Hitachi Web Server accepts an SSL certificate sent by a clinet trying to connect to the Server even if the certificate is fraudulent. The vulnerability does not affect the product if the SSL authenticaton client feature is disabled.An attacker could gain access with a fraudulent certificate. Adobe Reader fails to properly handle RSA signatures. Adobe Reader contains an issue where it may fail to properly verify RSA signatures. Masahiko Takenaka of FUJITSU LABORATORIES LTD. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.An attacker may be able to forge an RSA signature on a PDF document. A flaw in the OpenSSL library could allow a remote attacker to cause a denial of service on an affected application. The NSS libraries used in the Sun One Application Server and the Sun Java System web server contain an unspecified vulnerability that may allow an attacker to create a denial-of-service condition. An attacker may exploit this issue to sign digital certificates or RSA keys and take advantage of trust relationships that depend on these credentials, possibly posing as a trusted party and signing a certificate or key. All versions prior to and including OpenSSL 0.9.7j and 0.9.8b are affected by this vulnerability. Updates are available. Any software using OpenSSL to verify X.509 certificates is potentially vulnerable to this issue, as well as any other use of PKCS #1 v1.5, including software uses OpenSSL for SSL or TLS. Updated packages are patched to address this issue. _______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4339 http://www.openssl.org/news/secadv_20060905.txt _______________________________________________________________________ Updated Packages: Mandriva Linux 2006.0: 8c5769bf04f65ba4c871556156e83a24 2006.0/RPMS/libopenssl0.9.7-0.9.7g-2.3.20060mdk.i586.rpm f4f595e10bc3ca3f075847ac25e5d78b 2006.0/RPMS/libopenssl0.9.7-devel-0.9.7g-2.3.20060mdk.i586.rpm 448ca33d2bf74e29650a72c4324ee26d 2006.0/RPMS/libopenssl0.9.7-static-devel-0.9.7g-2.3.20060mdk.i586.rpm 1d084addaaed6cf3933e21a59c831f37 2006.0/RPMS/openssl-0.9.7g-2.3.20060mdk.i586.rpm fffdadefbb4571005a0c48495eb9c112 2006.0/SRPMS/openssl-0.9.7g-2.3.20060mdk.src.rpm Mandriva Linux 2006.0/X86_64: c62f2df7b05b041498f0b8e335265d4f x86_64/2006.0/RPMS/lib64openssl0.9.7-0.9.7g-2.3.20060mdk.x86_64.rpm 3a113e1603e4827ef5ce2cc3e6fd30a8 x86_64/2006.0/RPMS/lib64openssl0.9.7-devel-0.9.7g-2.3.20060mdk.x86_64.rpm b991400c2bc6c2f1886ed8163fc64c46 x86_64/2006.0/RPMS/lib64openssl0.9.7-static-devel-0.9.7g-2.3.20060mdk.x86_64.rpm a1bec4a4d34fb73ea5fcd72e22a4f291 x86_64/2006.0/RPMS/openssl-0.9.7g-2.3.20060mdk.x86_64.rpm fffdadefbb4571005a0c48495eb9c112 x86_64/2006.0/SRPMS/openssl-0.9.7g-2.3.20060mdk.src.rpm Corporate 3.0: 89b73fa8deec7e2b87b2dc29ad854420 corporate/3.0/RPMS/libopenssl0.9.7-0.9.7c-3.5.C30mdk.i586.rpm fad4d18975f6eba4b0534fe8b1237512 corporate/3.0/RPMS/libopenssl0.9.7-devel-0.9.7c-3.5.C30mdk.i586.rpm 3755fdc390b94c4fd3e3ccbb69e27fa4 corporate/3.0/RPMS/libopenssl0.9.7-static-devel-0.9.7c-3.5.C30mdk.i586.rpm f1cbc11423cc40e1421b781638f1910d corporate/3.0/RPMS/openssl-0.9.7c-3.5.C30mdk.i586.rpm 2ecc834f99eceafe3567e8ed0e9277e3 corporate/3.0/SRPMS/openssl-0.9.7c-3.5.C30mdk.src.rpm Corporate 3.0/X86_64: f65a08626dcc23531a30f009ca6a8b52 x86_64/corporate/3.0/RPMS/lib64openssl0.9.7-0.9.7c-3.5.C30mdk.x86_64.rpm 67ac445d3ad9c1e2d19f4da624e6091f x86_64/corporate/3.0/RPMS/lib64openssl0.9.7-devel-0.9.7c-3.5.C30mdk.x86_64.rpm 70b179ba036cad4bd59d79716dd0af41 x86_64/corporate/3.0/RPMS/lib64openssl0.9.7-static-devel-0.9.7c-3.5.C30mdk.x86_64.rpm 133be57ba3ba96ca84a2d09cf661ddb8 x86_64/corporate/3.0/RPMS/openssl-0.9.7c-3.5.C30mdk.x86_64.rpm 2ecc834f99eceafe3567e8ed0e9277e3 x86_64/corporate/3.0/SRPMS/openssl-0.9.7c-3.5.C30mdk.src.rpm Multi Network Firewall 2.0: 9c361b601f34404e9d5809a726005303 mnf/2.0/RPMS/libopenssl0.9.7-0.9.7c-3.5.M20mdk.i586.rpm aae1f0dcdb8c3f41c417f3f4cc823363 mnf/2.0/RPMS/libopenssl0.9.7-devel-0.9.7c-3.5.M20mdk.i586.rpm d71945758cd4cab08bba725bc7086181 mnf/2.0/RPMS/libopenssl0.9.7-static-devel-0.9.7c-3.5.M20mdk.i586.rpm 1584f0ecda9e2a57a1c8f848e8422049 mnf/2.0/RPMS/openssl-0.9.7c-3.5.M20mdk.i586.rpm efe79e9da865fdae6fa4d1bf377fb27e mnf/2.0/SRPMS/openssl-0.9.7c-3.5.M20mdk.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/security/advisories If you want to report vulnerabilities, please contact security_(at)_mandriva.com _______________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team <security*mandriva.com> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.2.2 (GNU/Linux) iD8DBQFE/zXomqjQ0CJFipgRAqraAJ9dQKFCKZSs2+wIddQYrsrir0XI7ACffXU5 4LAKvCmOVrwEbNgrZUVjHwU= =6ziA -----END PGP SIGNATURE----- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ . - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201408-19 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: OpenOffice, LibreOffice: Multiple vulnerabilities Date: August 31, 2014 Bugs: #283370, #305195, #320491, #332321, #352864, #386081, #409509, #429482, #514886 ID: 201408-19 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities have been found in OpenOffice and LibreOffice, the worst of which may result in execution of arbitrary code. Background ========== OpenOffice is the open source version of StarOffice, a full office productivity suite. LibreOffice is a fork of OpenOffice. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 app-office/openoffice-bin < 3.5.5.3 >= 3.5.5.3 2 app-office/openoffice <= 3.5.5.3 Vulnerable! 3 app-office/libreoffice < 4.2.5.2 >= 4.2.5.2 4 app-office/libreoffice-bin < 4.2.5.2 >= 4.2.5.2 ------------------------------------------------------------------- NOTE: Certain packages are still vulnerable. Users should migrate to another package if one is available or wait for the existing packages to be marked stable by their architecture maintainers. ------------------------------------------------------------------- 4 affected packages Description =========== Multiple vulnerabilities have been discovered in OpenOffice and Libreoffice. Please review the CVE identifiers referenced below for details. Workaround ========== There is no known workaround at this time. Resolution ========== All OpenOffice (binary) users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot -v ">=app-office/openoffice-bin-3.5.5.3" All LibreOffice users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=app-office/libreoffice-4.2.5.2"= All LibreOffice (binary) users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot -v ">=app-office/libreoffice-bin-4.2.5.2" We recommend that users unmerge OpenOffice: # emerge --unmerge "app-office/openoffice" References ========== [ 1 ] CVE-2006-4339 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2006-4339 [ 2 ] CVE-2009-0200 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0200 [ 3 ] CVE-2009-0201 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0201 [ 4 ] CVE-2009-0217 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0217 [ 5 ] CVE-2009-2949 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2949 [ 6 ] CVE-2009-2950 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2950 [ 7 ] CVE-2009-3301 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3301 [ 8 ] CVE-2009-3302 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3302 [ 9 ] CVE-2010-0395 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0395 [ 10 ] CVE-2010-2935 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2935 [ 11 ] CVE-2010-2936 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2936 [ 12 ] CVE-2010-3450 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3450 [ 13 ] CVE-2010-3451 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3451 [ 14 ] CVE-2010-3452 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3452 [ 15 ] CVE-2010-3453 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3453 [ 16 ] CVE-2010-3454 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3454 [ 17 ] CVE-2010-3689 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3689 [ 18 ] CVE-2010-4253 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4253 [ 19 ] CVE-2010-4643 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4643 [ 20 ] CVE-2011-2713 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2713 [ 21 ] CVE-2012-0037 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0037 [ 22 ] CVE-2012-1149 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1149 [ 23 ] CVE-2012-2149 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2149 [ 24 ] CVE-2012-2334 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2334 [ 25 ] CVE-2012-2665 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2665 [ 26 ] CVE-2014-0247 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0247 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-201408-19.xml Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2014 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5 . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c00849540 Version: 1 HPSBUX02186 SSRT071299 rev.1 - HP-UX running Apache Remote Execution of Arbitrary Code, Denial of Service (DoS), Unauthorized Access NOTICE: The information in this Security Bulletin should be acted upon as soon as possible. Release Date: 2007-01-17 Last Updated: 2007-01-23 Potential Security Impact: Remote execution of arbitrary code, Denial of Service (DoS), and unauthorized access. Source: Hewlett-Packard Company, HP Software Security Response Team VULNERABILITY SUMMARY Potential security vulnerabilities have been identified with Apache running on HP-UX. These vulnerabilities could be exploited remotely to allow execution of arbitrary code, Denial of Service (DoS), or unauthorized access. References: CVE-2006-2940, CVE-2006-2937, CVE-2006-3738, CVE-2006-4343, CVE-2006-4339, CVE-2005-2969. SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. HP-UX B.11.11, B.11.23, and B.11.31 running Apache-based Web Server prior to v.2.0.58.01 BACKGROUND AFFECTED VERSIONS For IPv4: HP-UX B.11.00 HP-UX B.11.11 =========== hpuxwsAPACHE action: install revision A.2.0.58.01 or subsequent restart Apache URL:http://h20293.www2.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=HPUXWSSUITE For IPv6: HP-UX B.11.11 =========== hpuxwsAPACHE,revision=B.1.0.00.01 hpuxwsAPACHE,revision=B.1.0.07.01 hpuxwsAPACHE,revision=B.1.0.08.01 hpuxwsAPACHE,revision=B.1.0.09.01 hpuxwsAPACHE,revision=B.1.0.10.01 hpuxwsAPACHE,revision=B.2.0.48.00 hpuxwsAPACHE,revision=B.2.0.49.00 hpuxwsAPACHE,revision=B.2.0.50.00 hpuxwsAPACHE,revision=B.2.0.51.00 hpuxwsAPACHE,revision=B.2.0.52.00 hpuxwsAPACHE,revision=B.2.0.53.00 hpuxwsAPACHE,revision=B.2.0.54.00 hpuxwsAPACHE,revision=B.2.0.55.00 hpuxwsAPACHE,revision=B.2.0.56.00 hpuxwsAPACHE,revision=B.2.0.58.00 action: install revision B.2.0.58.01 or subsequent restart Apache URL:http://h20293.www2.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=HPUXWSSUITE HP-UX B.11.23 =========== hpuxwsAPACHE action: install revision B.2.0.58.01 or subsequent restart Apache URL:http://h20293.www2.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=HPUXWSSUITE END AFFECTED VERSIONS RESOLUTION HP has made the following software updates available to resolve the issue. Software updates for the Apache-based Web Server are available from: http://h20293.www2.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=HPUXWSSUITE HP-UX B.11.00, B.11.11 and HP-UX B.11.23 require the Apache-based Web Server v.2.0.58.01 or subsequent. Apache Update Procedure Check for Apache Installation ----------------------------- To determine if the Apache web server from HP is installed on your system, use Software Distributor's swlist command. All three revisions of the product may co-exist on a single system. For example, the results of the command swlist -l product | grep -I apache hpuxwsAPACHE B.2.0.55.00 HP-UX Apache-based Web Server Stop Apache ------------- Before updating, make sure the previous Apache binary is stopped. If Apache is not stopped, the installation would be successful but the new version would be prevented from starting until a later time. After determining which Apache is installed, stop Apache with the following commands: for hpuxwsAPACHE: /opt/hpws/apache[32]/bin/apachectl stop Download and Install Apache -------------------------- Download Apache from Software Depot. http://h20293.www2.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=HPUXWSSUITE Verify successful download by comparing the cksum with the value specified on the installation web page. Use SD to swinstall the depot. Installation of this new revision of HP Apache over an existing HP Apache installation is supported, while installation over a non-HP Apache is NOT supported. Removing Apache Installation --------------------------- The potential vulnerability can also be resolved by removing Apache rather than installing a newer revision. To remove Apache use both Software Distributor's "swremove" command and also "rm -rf" the home location as specified in the rc.config.d file "HOME" variables. %ls /etc/rc.config.d | \ grep apache hpapache2conf hpws_apache[32]conf MANUAL ACTIONS: Yes - Update plus other actions Install the revision of the product. PRODUCT SPECIFIC INFORMATION HP-UX Security Patch Check: Security Patch Check revision B.02.00 analyzes all HP-issued Security Bulletins to provide a subset of recommended actions that potentially affect a specific HP-UX system. For more information: http://software.hp.com/portal/swdepot/displayProductInfo.do?productNumber=B6834AA HISTORY: rev.1 - 23 January 2007 Initial Release Third Party Security Patches: Third party security patches which are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy. Support: For further information, contact normal HP Services support channel. Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com It is strongly recommended that security related information being communicated to HP be encrypted using PGP, especially exploit information. To get the security-alert PGP key, please send an e-mail message as follows: To: security-alert@hp.com Subject: get key Subscribe: To initiate a subscription to receive future HP Security Bulletins via Email: http://h30046.www3.hp.com/driverAlertProfile.php?regioncode=NA&langcode=USENG&jumpid=in_SC-GEN__driverITRC&topiccode=ITRC On the web page: ITRC security bulletins and patch sign-up Under Step1: your ITRC security bulletins and patches - check ALL categories for which alerts are required and continue. Under Step2: your ITRC operating systems - verify your operating system selections are checked and save. To update an existing subscription: http://h30046.www3.hp.com/subSignIn.php Log in on the web page: Subscriber's choice for Business: sign-in. On the web page: Subscriber's Choice: your profile summary - use Edit Profile to update appropriate sections. To review previously published Security Bulletins visit: http://www.itrc.hp.com/service/cki/secBullArchive.do * The Software Product Category that this Security Bulletin relates to is represented by the 5th and 6th characters of the Bulletin number in the title: GN = HP General SW MA = HP Management Agents MI = Misc. 3rd Party SW MP = HP MPE/iX NS = HP NonStop Servers OV = HP OpenVMS PI = HP Printing & Imaging ST = HP Storage SW TL = HP Trusted Linux TU = HP Tru64 UNIX UX = HP-UX VV = HP VirtualVault System management and security procedures must be reviewed frequently to maintain system integrity. HP is continually reviewing and enhancing the security features of software products to provide customers with current secure solutions. "HP is broadly distributing this Security Bulletin in order to bring to the attention of users of the affected HP products the important security information contained in this Bulletin. HP recommends that all users determine the applicability of this information to their individual situations and take appropriate action. HP does not warrant that this information is necessarily accurate or complete for all user situations and, consequently, HP will not be responsible for any damages resulting from user's use or disregard of the information provided in this Bulletin. To the extent permitted by law, HP disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose, title and non-infringement." \xa9Copyright 2007 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental, special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. -----BEGIN PGP SIGNATURE----- Version: PGP 8.1 iQA/AwUBRbc7fOAfOvwtKn1ZEQJs6ACg9AMS2ZtEgsaZh7T9e8Q0OgyfmEQAni1I otH/juFiPayhwdxQwX1pZwdm =e4BA -----END PGP SIGNATURE----- . Background ========== OpenSSL is a toolkit implementing the Secure Sockets Layer, Transport Layer Security protocols and a general-purpose cryptography library. The x86 emulation base libraries for AMD64 contain a vulnerable version of OpenSSL. NOTE: Any packages listed without architecture tags apply to all architectures... HP System Management Homepage (SMH) versions prior to 2.1.7 running on Linux and Windows. BACKGROUND RESOLUTION HP has provided System Management Homepage (SMH) version 2.1.7 or subsequent for each platform to resolve this issue. Background ========== The Mozilla Network Security Service is a library implementing security features like SSL v.2/v.3, TLS, PKCS #5, PKCS #7, PKCS #11, PKCS #12, S/MIME and X.509 certificates. This impacts any software using the NSS library, like the Mozilla products Firefox, Thunderbird and Seamonkey. For the stable distribution (sarge) this problem has been fixed in version 0.9.7e-3sarge2 For the unstable distribution (sid) this problem has been fixed in version 0.9.8b-3 We recommend that you upgrade your openssl packages. Note that services linking against the openssl shared libraries will need to be restarted. Common examples of such services include most Mail Transport Agents, SSH servers, and web servers. Upgrade Instructions - -------------------- wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given below: apt-get update will update the internal database apt-get upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. Debian GNU/Linux 3.1 alias sarge - -------------------------------- Source archives: http://security.debian.org/pool/updates/main/o/openssl/openssl_0.9.7e-3sarge2.dsc Size/MD5 checksum: 639 a6d3c0f1fae595b8c2f7a45ca76dff1f http://security.debian.org/pool/updates/main/o/openssl/openssl_0.9.7e-3sarge2.diff.gz Size/MD5 checksum: 27435 16d02ad2e1e531617e5d533553340a83 http://security.debian.org/pool/updates/main/o/openssl/openssl_0.9.7e.orig.tar.gz Size/MD5 checksum: 3043231 a8777164bca38d84e5eb2b1535223474 Alpha architecture: http://security.debian.org/pool/updates/main/o/openssl/libssl-dev_0.9.7e-3sarge2_alpha.deb Size/MD5 checksum: 3339496 917761204c442b6470cc84364a1d5227 http://security.debian.org/pool/updates/main/o/openssl/libssl0.9.7_0.9.7e-3sarge2_alpha.deb Size/MD5 checksum: 2445696 6d894629524dcefbefa0f813cb588bef http://security.debian.org/pool/updates/main/o/openssl/openssl_0.9.7e-3sarge2_alpha.deb Size/MD5 checksum: 929948 117af21021dfea510ac09e9a09c1dfd9 AMD64 architecture: http://security.debian.org/pool/updates/main/o/openssl/libssl-dev_0.9.7e-3sarge2_amd64.deb Size/MD5 checksum: 2693336 c45662184c5ed338e179f3ec5e39289e http://security.debian.org/pool/updates/main/o/openssl/libssl0.9.7_0.9.7e-3sarge2_amd64.deb Size/MD5 checksum: 769324 e216b2d3b89634457906140fcff4c5ac http://security.debian.org/pool/updates/main/o/openssl/openssl_0.9.7e-3sarge2_amd64.deb Size/MD5 checksum: 903454 52d2ce0e5d967ca1a77a33f9417fd798 ARM architecture: http://security.debian.org/pool/updates/main/o/openssl/libssl-dev_0.9.7e-3sarge2_arm.deb Size/MD5 checksum: 2555074 fd529ad701cfbbde50845aa3e0ba4d5e http://security.debian.org/pool/updates/main/o/openssl/libssl0.9.7_0.9.7e-3sarge2_arm.deb Size/MD5 checksum: 689548 a626529a0d9f52d069e6fcb1ec3a2513 http://security.debian.org/pool/updates/main/o/openssl/openssl_0.9.7e-3sarge2_arm.deb Size/MD5 checksum: 893880 58bcc0001bf7e014b6a1d7ab9849cf2c HP Precision architecture: http://security.debian.org/pool/updates/main/o/openssl/libssl-dev_0.9.7e-3sarge2_hppa.deb Size/MD5 checksum: 2694850 7dd819a9adddc660268d260df3e8cea2 http://security.debian.org/pool/updates/main/o/openssl/libssl0.9.7_0.9.7e-3sarge2_hppa.deb Size/MD5 checksum: 790570 06a37ff4879fab7ee26ac35f6526d7c3 http://security.debian.org/pool/updates/main/o/openssl/openssl_0.9.7e-3sarge2_hppa.deb Size/MD5 checksum: 914188 74e469de973e495e93455816587b63db Intel IA-32 architecture: http://security.debian.org/pool/updates/main/o/openssl/libssl-dev_0.9.7e-3sarge2_i386.deb Size/MD5 checksum: 2553346 946eaef80a1dc82af47e10d4913153b3 http://security.debian.org/pool/updates/main/o/openssl/libssl0.9.7_0.9.7e-3sarge2_i386.deb Size/MD5 checksum: 2262628 a4e5d09c7086373d2a76370c71542ce0 http://security.debian.org/pool/updates/main/o/openssl/openssl_0.9.7e-3sarge2_i386.deb Size/MD5 checksum: 908336 e850093346e148d2132d59db3184d398 Intel IA-64 architecture: http://security.debian.org/pool/updates/main/o/openssl/libssl-dev_0.9.7e-3sarge2_ia64.deb Size/MD5 checksum: 3394850 a43e3948b612ea7b48cdcb267fb26ef5 http://security.debian.org/pool/updates/main/o/openssl/libssl0.9.7_0.9.7e-3sarge2_ia64.deb Size/MD5 checksum: 1037694 e4cda7f8044cbc72ebbef123124461ea http://security.debian.org/pool/updates/main/o/openssl/openssl_0.9.7e-3sarge2_ia64.deb Size/MD5 checksum: 974802 a6dcd78bc35ca46bb21ac24ac1ccde1b Motorola 680x0 architecture: http://security.debian.org/pool/updates/main/o/openssl/libssl-dev_0.9.7e-3sarge2_m68k.deb Size/MD5 checksum: 2316460 403eae3e2c3f396a0e789069e8896036 http://security.debian.org/pool/updates/main/o/openssl/libssl0.9.7_0.9.7e-3sarge2_m68k.deb Size/MD5 checksum: 661108 eeb8f5b59f10b7c5ed5187f25b1505e6 http://security.debian.org/pool/updates/main/o/openssl/openssl_0.9.7e-3sarge2_m68k.deb Size/MD5 checksum: 889522 07baf9c082693a1bbf7d81d49f5dd216 Big endian MIPS architecture: http://security.debian.org/pool/updates/main/o/openssl/libssl-dev_0.9.7e-3sarge2_mips.deb Size/MD5 checksum: 2778514 ef833284a26b9ad69eb22c169dcb822f http://security.debian.org/pool/updates/main/o/openssl/libssl0.9.7_0.9.7e-3sarge2_mips.deb Size/MD5 checksum: 705952 57a2075ffd4746c1c989c06be4e5587e http://security.debian.org/pool/updates/main/o/openssl/openssl_0.9.7e-3sarge2_mips.deb Size/MD5 checksum: 896456 0d93ca64cbc1608c5a8345a574b47ada Little endian MIPS architecture: http://security.debian.org/pool/updates/main/o/openssl/libssl-dev_0.9.7e-3sarge2_mipsel.deb Size/MD5 checksum: 2766270 1d197335ffe887e31525c04466dfd66c http://security.debian.org/pool/updates/main/o/openssl/libssl0.9.7_0.9.7e-3sarge2_mipsel.deb Size/MD5 checksum: 693836 45f358db6b4e149982a16cced46eb1d7 http://security.debian.org/pool/updates/main/o/openssl/openssl_0.9.7e-3sarge2_mipsel.deb Size/MD5 checksum: 895636 60f63815017772f9dcbcfce2d8aa9138 PowerPC architecture: http://security.debian.org/pool/updates/main/o/openssl/libssl-dev_0.9.7e-3sarge2_powerpc.deb Size/MD5 checksum: 2774840 012631d48936597d2bdb35a2c9e597cc http://security.debian.org/pool/updates/main/o/openssl/libssl0.9.7_0.9.7e-3sarge2_powerpc.deb Size/MD5 checksum: 778946 3e0d5b50e5c3a1b00faf6c7c18a8ac4f http://security.debian.org/pool/updates/main/o/openssl/openssl_0.9.7e-3sarge2_powerpc.deb Size/MD5 checksum: 908016 8bfe8de155f113aef3edca883cd72dac IBM S/390 architecture: http://security.debian.org/pool/updates/main/o/openssl/libssl-dev_0.9.7e-3sarge2_s390.deb Size/MD5 checksum: 2716386 e8744dd7d49acabdd664bdd505e9efae http://security.debian.org/pool/updates/main/o/openssl/libssl0.9.7_0.9.7e-3sarge2_s390.deb Size/MD5 checksum: 813542 05846cc017a99f250d8104c406f2a609 http://security.debian.org/pool/updates/main/o/openssl/openssl_0.9.7e-3sarge2_s390.deb Size/MD5 checksum: 918208 f78b15dae8f8072339e601793707c4eb Sun Sparc architecture: http://security.debian.org/pool/updates/main/o/openssl/libssl-dev_0.9.7e-3sarge2_sparc.deb Size/MD5 checksum: 2629368 4532f9940cf010b00b0d1404c11f9da5 http://security.debian.org/pool/updates/main/o/openssl/libssl0.9.7_0.9.7e-3sarge2_sparc.deb Size/MD5 checksum: 1884394 f7a8f112bb7e09c8c1dacc68c923cd40 http://security.debian.org/pool/updates/main/o/openssl/openssl_0.9.7e-3sarge2_sparc.deb Size/MD5 checksum: 924208 a5e3e93b474e23a0f858eaa3a329d2de These files will probably be moved into the stable distribution on its next update. This is related to: SA21709 2) An error in the included libxmlsec library can be exploited to potentially forge a valid signature. For more information: SA35854 3) An error in the included MSVC Runtime package can be exploited to bypass certain security features. SOLUTION: Update to version 3.2. PROVIDED AND/OR DISCOVERED BY: The vendor credits: 4) Sebastian Apelt of siberas 5) Frank Rei\xdfner and Sebastian Apelt of siberas 6) Nicolas Joly of Vupen ORIGINAL ADVISORY: http://www.openoffice.org/security/cves/CVE-2006-4339.html http://www.openoffice.org/security/cves/CVE-2009-0217.html http://www.openoffice.org/security/cves/CVE-2009-2493.html http://www.openoffice.org/security/cves/CVE-2009-2949.html http://www.openoffice.org/security/cves/CVE-2009-2950.html http://www.openoffice.org/security/cves/CVE-2009-3301-3302.html OTHER REFERENCES: SA21709: http://secunia.com/advisories/21709/ SA35854: http://secunia.com/advisories/35854/ SA35967: http://secunia.com/advisories/35967/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 6.3

sources: NVD: CVE-2006-4339 // CERT/CC: VU#845620 // JVNDB: JVNDB-2007-000772 // JVNDB: JVNDB-2012-000079 // CERT/CC: VU#386964 // CERT/CC: VU#547300 // CERT/CC: VU#594904 // BID: 19849 // PACKETSTORM: 49782 // PACKETSTORM: 128056 // PACKETSTORM: 53990 // PACKETSTORM: 49826 // PACKETSTORM: 58346 // PACKETSTORM: 51167 // PACKETSTORM: 49927 // PACKETSTORM: 86249 // PACKETSTORM: 86234

AFFECTED PRODUCTS

vendor:debian gnu linuxmodel: - scope: - version: -

Trust: 2.4

vendor:f5model: - scope: - version: -

Trust: 2.4

vendor:freebsdmodel: - scope: - version: -

Trust: 2.4

vendor:openpkgmodel: - scope: - version: -

Trust: 2.4

vendor:opensslmodel: - scope: - version: -

Trust: 2.4

vendor:oraclemodel: - scope: - version: -

Trust: 2.4

vendor:red hatmodel: - scope: - version: -

Trust: 2.4

vendor:suse linuxmodel: - scope: - version: -

Trust: 2.4

vendor:slackware linuxmodel: - scope: - version: -

Trust: 2.4

vendor:ubuntumodel: - scope: - version: -

Trust: 2.4

vendor:rpathmodel: - scope: - version: -

Trust: 2.4

vendor:trustix secure linuxmodel: - scope: - version: -

Trust: 1.6

vendor:sun microsystemsmodel: - scope: - version: -

Trust: 1.6

vendor:hitachimodel:cosminexus application server enterprisescope:eqversion:version 6

Trust: 1.6

vendor:hitachimodel:cosminexus application server standardscope:eqversion:version 6

Trust: 1.6

vendor:hitachimodel:cosminexus application server version 5scope: - version: -

Trust: 1.6

vendor:hitachimodel:cosminexus developer light version 6scope: - version: -

Trust: 1.6

vendor:hitachimodel:cosminexus developer professional version 6scope: - version: -

Trust: 1.6

vendor:hitachimodel:cosminexus developer standard version 6scope: - version: -

Trust: 1.6

vendor:hitachimodel:cosminexus developer version 5scope: - version: -

Trust: 1.6

vendor:hitachimodel:cosminexus server - enterprise editionscope: - version: -

Trust: 1.6

vendor:hitachimodel:cosminexus server - standard editionscope: - version: -

Trust: 1.6

vendor:hitachimodel:cosminexus server - standard edition version 4scope: - version: -

Trust: 1.6

vendor:hitachimodel:cosminexus server - web editionscope: - version: -

Trust: 1.6

vendor:hitachimodel:cosminexus server - web edition version 4scope: - version: -

Trust: 1.6

vendor:hitachimodel:web serverscope: - version: -

Trust: 1.6

vendor:hitachimodel:ucosminexus application server enterprisescope: - version: -

Trust: 1.6

vendor:hitachimodel:ucosminexus application server standardscope: - version: -

Trust: 1.6

vendor:hitachimodel:ucosminexus developerscope:eqversion:professional

Trust: 1.6

vendor:hitachimodel:ucosminexus developer lightscope: - version: -

Trust: 1.6

vendor:hitachimodel:ucosminexus developer standardscope: - version: -

Trust: 1.6

vendor:hitachimodel:ucosminexus service architectscope: - version: -

Trust: 1.6

vendor:hitachimodel:ucosminexus service platformscope: - version: -

Trust: 1.6

vendor:sunmodel:jre 011scope:eqversion:1.2.2

Trust: 1.5

vendor:sunmodel:sdk 011scope:eqversion:1.2.2

Trust: 1.5

vendor:sunmodel:jre 010scope:eqversion:1.2.2

Trust: 1.5

vendor:sunmodel:sdk 010scope:eqversion:1.2.2

Trust: 1.2

vendor:sunmodel:jre 013scope:eqversion:1.2.2

Trust: 1.2

vendor:sunmodel:jre 014scope:eqversion:1.2.2

Trust: 1.2

vendor:sunmodel:jrescope:eqversion:1.2.2

Trust: 1.2

vendor:opensslmodel:opensslscope:eqversion:0.9.8b

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.2b

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.6

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.6f

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.6m

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.6a

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.5

Trust: 1.0

vendor:opensslmodel:opensslscope:lteversion:0.9.7

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.6b

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.6i

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.6k

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.6l

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.3

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.1c

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.6e

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.7j

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.8

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.6j

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.7d

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.7g

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.7e

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.6g

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.7f

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.6h

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.7c

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.5a

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.7i

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.7a

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.7h

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.3a

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.8a

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.6c

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.6d

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.7b

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:0.9.4

Trust: 1.0

vendor:sunmodel:sdk 08scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:sdk 11scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:sdk 15scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:jrescope:eqversion:1.5

Trust: 0.9

vendor:sunmodel:jrescope:eqversion:1.1.8

Trust: 0.9

vendor:sunmodel:jre 06scope:eqversion:1.5

Trust: 0.9

vendor:sunmodel:jre 015scope:eqversion:1.2.2

Trust: 0.9

vendor:sunmodel:jre 01scope:eqversion:1.4.1

Trust: 0.9

vendor:sunmodel:jre 10scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:jre 14scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:sdk 03scope:eqversion:1.4.1

Trust: 0.9

vendor:sunmodel:jdk 09scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jdk 007scope:eqversion:1.1.6

Trust: 0.9

vendor:sunmodel:jre 1.4.2 12scope: - version: -

Trust: 0.9

vendor:sunmodel:sdk 06scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:jre 02scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:sdk .0 02scope:eqversion:1.3

Trust: 0.9

vendor:sunmodel:jre .0 04scope:eqversion:1.4

Trust: 0.9

vendor:sunmodel:jrescope:eqversion:1.4

Trust: 0.9

vendor:sunmodel:jre 07scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:jre 11scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:jre 03scope:eqversion:1.4.1

Trust: 0.9

vendor:sunmodel:sdk 02scope:eqversion:1.4.1

Trust: 0.9

vendor:sunmodel:jre 01scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jre 04scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jre .0 02scope:eqversion:1.3

Trust: 0.9

vendor:sunmodel:sdk 07scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:jdk b 005scope:eqversion:1.1.7

Trust: 0.9

vendor:sunmodel:sdk 10scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:jre 02scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:sdkscope:eqversion:1.2

Trust: 0.9

vendor:sunmodel:jre 01scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:jre .0 03scope:eqversion:1.4

Trust: 0.9

vendor:sunmodel:sdk .0 03scope:eqversion:1.4

Trust: 0.9

vendor:sunmodel:jre 02scope:eqversion:1.4.1

Trust: 0.9

vendor:sunmodel:sdk 09scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:sdk 14scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:jdk .0 05scope:eqversion:1.5

Trust: 0.9

vendor:sunmodel:jre 06scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:sdk 12scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:jrescope:eqversion:1.4.1

Trust: 0.9

vendor:sunmodel:jre 03scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:sdk 02scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:sdkscope:eqversion:1.4.1

Trust: 0.9

vendor:sunmodel:sdk 08scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:sdk .0 4scope:eqversion:1.4

Trust: 0.9

vendor:sunmodel:sdk .0 02scope:eqversion:1.4

Trust: 0.9

vendor:sunmodel:sdk 007scope:eqversion:1.2.2

Trust: 0.9

vendor:sunmodel:jrescope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jrescope:eqversion:1.2.1

Trust: 0.9

vendor:sunmodel:jre 06scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:sdk 01scope:eqversion:1.4.1

Trust: 0.9

vendor:sunmodel:jre .0 02scope:eqversion:1.4

Trust: 0.9

vendor:sunmodel:jre 13scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:sdkscope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:sdk 13scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:jdk 008scope:eqversion:1.1.8

Trust: 0.9

vendor:sunmodel:jdk 08scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jre 05scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jre 08scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:jrescope:eqversion:1.2

Trust: 0.9

vendor:sunmodel:sdk 04scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jre 12scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:sdk 05scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:sdk 03scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jre 03scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:sdkscope:eqversion:1.4

Trust: 0.9

vendor:sunmodel:jre .0 05scope:eqversion:1.3

Trust: 0.9

vendor:sunmodel:jre 05scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:sdk 05scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:sdk 03scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:sdk 015scope:eqversion:1.2.2

Trust: 0.9

vendor:sunmodel:sdkscope:eqversion:1.2.1

Trust: 0.9

vendor:sunmodel:sdk 012scope:eqversion:1.2.2

Trust: 0.9

vendor:sunmodel:jre 09scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:sdk 014scope:eqversion:1.2.2

Trust: 0.9

vendor:sunmodel:jre 007scope:eqversion:1.2.2

Trust: 0.9

vendor:sunmodel:jdk 009scope:eqversion:1.1.8

Trust: 0.9

vendor:appgate network securitymodel: - scope: - version: -

Trust: 0.8

vendor:apple computermodel: - scope: - version: -

Trust: 0.8

vendor:attachmatewrqmodel: - scope: - version: -

Trust: 0.8

vendor:avayamodel: - scope: - version: -

Trust: 0.8

vendor:blue coatmodel: - scope: - version: -

Trust: 0.8

vendor:ciscomodel: - scope: - version: -

Trust: 0.8

vendor:gentoo linuxmodel: - scope: - version: -

Trust: 0.8

vendor:gnutlsmodel: - scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel: - scope: - version: -

Trust: 0.8

vendor:iaik java groupmodel: - scope: - version: -

Trust: 0.8

vendor:ibmmodel: - scope: - version: -

Trust: 0.8

vendor:internet consortiummodel: - scope: - version: -

Trust: 0.8

vendor:intotomodel: - scope: - version: -

Trust: 0.8

vendor:junipermodel: - scope: - version: -

Trust: 0.8

vendor:mandrivamodel: - scope: - version: -

Trust: 0.8

vendor:mozillamodel: - scope: - version: -

Trust: 0.8

vendor:openwall gnu linuxmodel: - scope: - version: -

Trust: 0.8

vendor:operamodel: - scope: - version: -

Trust: 0.8

vendor:rsa securitymodel: - scope: - version: -

Trust: 0.8

vendor:ssh security corpmodel: - scope: - version: -

Trust: 0.8

vendor:sybasemodel: - scope: - version: -

Trust: 0.8

vendor:vmwaremodel: - scope: - version: -

Trust: 0.8

vendor:vandykemodel: - scope: - version: -

Trust: 0.8

vendor:stonesoftmodel: - scope: - version: -

Trust: 0.8

vendor:adobemodel:readerscope:lteversion:8.x

Trust: 0.8

vendor:sunmodel:jre 005scope:eqversion:1.2.2

Trust: 0.6

vendor:sunmodel:jre 04scope:eqversion:1.3.1

Trust: 0.6

vendor:sunmodel:jre .0 01scope:eqversion:1.4

Trust: 0.6

vendor:sunmodel:jdk 003scope:eqversion:1.2.1

Trust: 0.6

vendor:sunmodel:jre 12scope:eqversion:1.4.2

Trust: 0.6

vendor:sunmodel:jdkscope:eqversion:1.1.8

Trust: 0.6

vendor:sunmodel:jdk 06scope:eqversion:1.2.2

Trust: 0.6

vendor:sunmodel:jre 007scope:eqversion:1.1.8

Trust: 0.6

vendor:sunmodel:jdk .0 04scope:eqversion:1.5

Trust: 0.6

vendor:sunmodel:jdk 005scope:eqversion:1.1.8

Trust: 0.6

vendor:sunmodel:jrescope:eqversion:1.3

Trust: 0.6

vendor:sunmodel:sdk 13scope:eqversion:1.2.2

Trust: 0.6

vendor:sunmodel:sdk 005scope:eqversion:1.2.2

Trust: 0.6

vendor:sunmodel:jre .0 04scope:eqversion:1.3

Trust: 0.6

vendor:sunmodel:jdk 006scope:eqversion:1.2.2

Trust: 0.6

vendor:sunmodel:sdk 01scope:eqversion:1.3.1

Trust: 0.6

vendor:sunmodel:jdk 05scope:eqversion:1.2.2

Trust: 0.6

vendor:sunmodel:jdk 007scope:eqversion:1.1.8

Trust: 0.6

vendor:sunmodel:jdk .0 03scope:eqversion:1.5

Trust: 0.6

vendor:sunmodel:jre 12scope:eqversion:1.2.2

Trust: 0.6

vendor:sybasemodel:appeonscope:eqversion:3.1

Trust: 0.6

vendor:sunmodel:jdk 06scope:eqversion:1.5

Trust: 0.6

vendor:sunmodel:jre b 007scope:eqversion:1.1.7

Trust: 0.6

vendor:sunmodel:sdk 05scope:eqversion:1.3

Trust: 0.6

vendor:sunmodel:jdk 002scope:eqversion:1.1.8

Trust: 0.6

vendor:sunmodel:jre 008scope:eqversion:1.1.8

Trust: 0.6

vendor:sunmodel:jdk 004scope:eqversion:1.2.2

Trust: 0.6

vendor:sunmodel:sdk 12scope:eqversion:1.2.2

Trust: 0.6

vendor:sunmodel:jdk 009scope:eqversion:1.1.6

Trust: 0.6

vendor:sunmodel:jdk 004scope:eqversion:1.2.1

Trust: 0.6

vendor:sunmodel:sdk 013scope:eqversion:1.2.2

Trust: 0.6

vendor:sunmodel:jdk b 007scope:eqversion:1.1.7

Trust: 0.6

vendor:sunmodel:jre 012scope:eqversion:1.2.2

Trust: 0.6

vendor:sunmodel:jre 005scope:eqversion:1.1.8

Trust: 0.6

vendor:sunmodel:jre 009scope:eqversion:1.1.8

Trust: 0.6

vendor:beamodel:systems weblogic expressscope:eqversion:7.0.0.1

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:4.3

Trust: 0.3

vendor:ciscomodel:security agentscope:neversion:5.1.79

Trust: 0.3

vendor:redhatmodel:enterprise linux es ia64scope:eqversion:2.1

Trust: 0.3

vendor:opensslmodel:project openssl gscope:eqversion:0.9.7

Trust: 0.3

vendor:securemodel:computing snapgear sg565scope:eqversion:0

Trust: 0.3

vendor:ciscomodel:ciscoworks common servicesscope:eqversion:2.2

Trust: 0.3

vendor:sshmodel:communications security ssh tectia serverscope:eqversion:4.4.5

Trust: 0.3

vendor:ciscomodel:ons 15454sdhscope:eqversion:4.0(1)

Trust: 0.3

vendor:attachmatemodel:reflection for secure itscope:eqversion:6.1

Trust: 0.3

vendor:s u s emodel:linux professionalscope:eqversion:9.0

Trust: 0.3

vendor:turbolinuxmodel:appliance server hosting editionscope:eqversion:1.0

Trust: 0.3

vendor:netbsdmodel:netbsdscope:eqversion:2.1

Trust: 0.3

vendor:ciscomodel:call managerscope:eqversion:5.1

Trust: 0.3

vendor:ciscomodel:ons optical transport platformscope:eqversion:154543.1.0

Trust: 0.3

vendor:opensslmodel:project openssl b-36.8scope:eqversion:0.9.6

Trust: 0.3

vendor:redhatmodel:enterprise linux extrasscope:eqversion:4

Trust: 0.3

vendor:sybasemodel:eii avaki sdfscope:eqversion:5.0

Trust: 0.3

vendor:sybasemodel:risk analytics platformscope:eqversion:2.9

Trust: 0.3

vendor:beamodel:systems weblogic express spscope:eqversion:7.03

Trust: 0.3

vendor:avayamodel:s8300 cmscope:eqversion:3.1

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.3.2

Trust: 0.3

vendor:sunmodel:java system web server sp2scope:eqversion:6.0

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:5.4

Trust: 0.3

vendor:sshmodel:communications security ssh tectia kscope:neversion:4.3.10

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:6.1

Trust: 0.3

vendor:susemodel:linux enterprise desktopscope:eqversion:10

Trust: 0.3

vendor:ciscomodel:onsscope:neversion:154548.0

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:9.1

Trust: 0.3

vendor:ipcopmodel:ipcopscope:eqversion:1.4.11

Trust: 0.3

vendor:vmwaremodel:workstation buildscope:neversion:6.0.380004

Trust: 0.3

vendor:sybasemodel:easerverscope:eqversion:5.5

Trust: 0.3

vendor:vandykemodel:securecrtscope:eqversion:5.2.2

Trust: 0.3

vendor:ibmmodel:hardware management console for iseriesscope:eqversion:3.3.7

Trust: 0.3

vendor:vmwaremodel:workstation buildscope:eqversion:5.5.334685

Trust: 0.3

vendor:sybasemodel:ffi global fix litescope:eqversion:0

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:5.2

Trust: 0.3

vendor:iscmodel:bind b1scope:eqversion:9.2.7

Trust: 0.3

vendor:ciscomodel:ons 15454sdhscope:eqversion:4.1(0)

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.1.6

Trust: 0.3

vendor:ciscomodel:ons 15454sdhscope:eqversion:4.1(1)

Trust: 0.3

vendor:opensslmodel:project openssl hscope:eqversion:0.9.7

Trust: 0.3

vendor:sybasemodel:unwired orchestratorscope:eqversion:5.1

Trust: 0.3

vendor:hpmodel:openvms secure web serverscope:eqversion:1.2

Trust: 0.3

vendor:sgimodel:propack sp6scope:eqversion:3.0

Trust: 0.3

vendor:opensslmodel:project openssl iscope:eqversion:0.9.7

Trust: 0.3

vendor:sunmodel:java web proxy server sp8scope:eqversion:3.6

Trust: 0.3

vendor:sybasemodel:workspacescope:eqversion:1.6

Trust: 0.3

vendor:openpkgmodel:2-stable-20061018scope: - version: -

Trust: 0.3

vendor:opensslmodel:project openssl bscope:eqversion:0.9.6

Trust: 0.3

vendor:sunmodel:jre bscope:eqversion:1.1.7

Trust: 0.3

vendor:sunmodel:jrescope:eqversion:1.3.1

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:5.3

Trust: 0.3

vendor:beamodel:systems weblogic server spscope:eqversion:8.12

Trust: 0.3

vendor:beamodel:systems weblogic server spscope:eqversion:7.0.0.11

Trust: 0.3

vendor:beamodel:systems weblogic express spscope:eqversion:7.04

Trust: 0.3

vendor:debianmodel:linux mipselscope:eqversion:3.1

Trust: 0.3

vendor:freebsdmodel:-release-p3scope:eqversion:4.11

Trust: 0.3

vendor:beamodel:systems weblogic server for win32 spscope:eqversion:8.12

Trust: 0.3

vendor:vmwaremodel:esx serverscope:eqversion:3.0.1

Trust: 0.3

vendor:beamodel:systems weblogic server for win32 spscope:eqversion:7.0.0.11

Trust: 0.3

vendor:operamodel:software opera web browser win32scope:eqversion:6.0

Trust: 0.3

vendor:s u s emodel:linux professional x86 64scope:eqversion:9.2

Trust: 0.3

vendor:redmodel:hat enterprise linux asscope:eqversion:3

Trust: 0.3

vendor:netbsdmodel:4,0 betascope: - version: -

Trust: 0.3

vendor:sunmodel:jre .0 01scope:eqversion:1.3

Trust: 0.3

vendor:freebsdmodel:-stablepre122300scope:eqversion:4.2

Trust: 0.3

vendor:iscmodel:bind a1scope:eqversion:9.4

Trust: 0.3

vendor:operamodel:software opera web browser 1win32scope:eqversion:7.0

Trust: 0.3

vendor:mandrakesoftmodel:corporate server x86 64scope:eqversion:4.0

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:5.10

Trust: 0.3

vendor:mandrivamodel:linux mandrakescope:eqversion:2006.0

Trust: 0.3

vendor:sunmodel:jdk 09scope:eqversion:1.1.8

Trust: 0.3

vendor:sybasemodel:unwired accelerator and enterprise portalscope:eqversion:7.0

Trust: 0.3

vendor:ciscomodel:mdsscope:eqversion:95000

Trust: 0.3

vendor:netscapemodel:netscapescope:eqversion:6.2.3

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:8.51

Trust: 0.3

vendor:sunmodel:jre 12scope:eqversion:1.1.8

Trust: 0.3

vendor:beamodel:systems weblogic express for win32 spscope:eqversion:8.13

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.8

Trust: 0.3

vendor:sunmodel:sdk 10scope:eqversion:1.2.2

Trust: 0.3

vendor:ciscomodel:ons optical transport platformscope:eqversion:154544.1(0)

Trust: 0.3

vendor:sybasemodel:risk analytics platformscope:eqversion:3.0

Trust: 0.3

vendor:sunmodel:java web proxy serverscope:eqversion:3.6

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:1.5.0.5

Trust: 0.3

vendor:openpkgmodel:openpkgscope:eqversion:2.1

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:4.3.3

Trust: 0.3

vendor:beamodel:systems weblogic express spscope:eqversion:7.0.0.12

Trust: 0.3

vendor:sunmodel:jdk 1.5.0.0 06scope: - version: -

Trust: 0.3

vendor:sunmodel:one application server standard editionscope:eqversion:7.0

Trust: 0.3

vendor:ingatemodel:siparatorscope:neversion:4.5.1

Trust: 0.3

vendor:sunmodel:java system web server sp9scope:eqversion:6.0

Trust: 0.3

vendor:s u s emodel:linux personal ossscope:eqversion:10.0

Trust: 0.3

vendor:sunmodel:sdk 04scope:eqversion:1.3.1

Trust: 0.3

vendor:sshmodel:communications security ssh tectia serverscope:eqversion:4.4.6

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:1.5.0.7

Trust: 0.3

vendor:mandrakesoftmodel:corporate serverscope:eqversion:4.0

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.0.1

Trust: 0.3

vendor:sunmodel:java system web server sp4scope:eqversion:6.1

Trust: 0.3

vendor:redhatmodel:enterprise linux wsscope:eqversion:2.1

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:4.1.3

Trust: 0.3

vendor:ciscomodel:access registrarscope: - version: -

Trust: 0.3

vendor:oraclemodel:http serverscope:eqversion:9.0.1

Trust: 0.3

vendor:sybasemodel:solonde etlscope:eqversion:3.6

Trust: 0.3

vendor:s u s emodel:linux openexchange serverscope: - version: -

Trust: 0.3

vendor:sunmodel:jssescope:eqversion:1.0.2

Trust: 0.3

vendor:sunmodel:one web server sp4scope:eqversion:6.0

Trust: 0.3

vendor:s u s emodel:linux personalscope:eqversion:9.2

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:4.1.1

Trust: 0.3

vendor:beamodel:systems weblogic server spscope:eqversion:7.05

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:7.54

Trust: 0.3

vendor:beamodel:systems weblogic server for win32scope:eqversion:7.0.0.1

Trust: 0.3

vendor:sunmodel:one web server sp7scope:eqversion:6.0

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:7.51

Trust: 0.3

vendor:beamodel:systems weblogic express for win32 spscope:eqversion:7.03

Trust: 0.3

vendor:sunmodel:one web server sp2scope:eqversion:6.0

Trust: 0.3

vendor:beamodel:systems weblogic server for win32 spscope:eqversion:7.05

Trust: 0.3

vendor:iscmodel:bind -p2scope:neversion:9.2.6

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:5.04

Trust: 0.3

vendor:vmwaremodel:workstationscope:eqversion:5.5.4

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.3.1

Trust: 0.3

vendor:sshmodel:communications security ssh tectia serverscope:eqversion:4.1

Trust: 0.3

vendor:sunmodel:java system web server sp2scope:eqversion:6.1

Trust: 0.3

vendor:freebsdmodel:-release-p5scope:eqversion:5.1

Trust: 0.3

vendor:s u s emodel:linux personal x86 64scope:eqversion:9.0

Trust: 0.3

vendor:sybasemodel:eii avaki sdfscope:eqversion:4.0

Trust: 0.3

vendor:gentoomodel:www-client/operascope:eqversion:9.0.2

Trust: 0.3

vendor:ciscomodel:ons 15454sdhscope:eqversion:2.3(5)

Trust: 0.3

vendor:openofficemodel:openofficescope:eqversion:2.3

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:7.10

Trust: 0.3

vendor:avayamodel:converged communications serverscope:eqversion:2.0

Trust: 0.3

vendor:operamodel:software opera web browser win32scope:eqversion:5.12

Trust: 0.3

vendor:ciscomodel:secure acs for windows ntscope:eqversion:2.6.2

Trust: 0.3

vendor:ciscomodel:security agentscope:eqversion:4.5

Trust: 0.3

vendor:opensslmodel:project openssl dscope:eqversion:0.9.6

Trust: 0.3

vendor:beamodel:systems weblogic server spscope:eqversion:7.01

Trust: 0.3

vendor:sybasemodel:rtdsscope:eqversion:2.0.1

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:4.2.2

Trust: 0.3

vendor:ciscomodel:gss global site selectorscope:eqversion:44900

Trust: 0.3

vendor:freebsdmodel:-stablescope:eqversion:6.0

Trust: 0.3

vendor:sshmodel:communications security ssh tectia serverscope:eqversion:4.4.4

Trust: 0.3

vendor:opensslmodel:project openssl beta2scope:eqversion:0.9.7

Trust: 0.3

vendor:ciscomodel:call manager es56scope:eqversion:4.0

Trust: 0.3

vendor:sunmodel:sdk 07scope:eqversion:1.2.2

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:4.10

Trust: 0.3

vendor:beamodel:systems weblogic server spscope:eqversion:7.06

Trust: 0.3

vendor:beamodel:systems weblogic server for win32 spscope:eqversion:7.01

Trust: 0.3

vendor:beamodel:systems weblogic server for win32 spscope:eqversion:7.06

Trust: 0.3

vendor:beamodel:systems weblogic server for win32 spscope:eqversion:7.02

Trust: 0.3

vendor:turbolinuxmodel:personalscope: - version: -

Trust: 0.3

vendor:operamodel:software opera web browser win32scope:eqversion:5.02

Trust: 0.3

vendor:beamodel:systems weblogic express for win32 spscope:eqversion:7.04

Trust: 0.3

vendor:opensslmodel:project openssl escope:eqversion:0.9.7

Trust: 0.3

vendor:freebsdmodel:-release-p32scope:eqversion:4.5

Trust: 0.3

vendor:openofficemodel:openofficescope:eqversion:3.1.1

Trust: 0.3

vendor:sunmodel:jre 007scope:eqversion:1.1.6

Trust: 0.3

vendor:sybasemodel:sdkscope:eqversion:12.5.1

Trust: 0.3

vendor:opensslmodel:project openssl fscope:eqversion:0.9.6

Trust: 0.3

vendor:ciscomodel:security agentscope:eqversion:5.1

Trust: 0.3

vendor:opensslmodel:project opensslscope:eqversion:0.9.7

Trust: 0.3

vendor:sunmodel:jre 01ascope:eqversion:1.3.1

Trust: 0.3

vendor:ciscomodel:works common servicesscope:eqversion:2.2

Trust: 0.3

vendor:attachmatemodel:reflection ftp clientscope:eqversion:12.0

Trust: 0.3

vendor:ciscomodel:secure acs for windows ntscope:eqversion:2.1

Trust: 0.3

vendor:vmwaremodel:esx serverscope:eqversion:2.5.3

Trust: 0.3

vendor:ciscomodel:unified presence serverscope:eqversion:1.0

Trust: 0.3

vendor:sybasemodel:ffi global fixscope:eqversion:0

Trust: 0.3

vendor:sshmodel:communications security ssh tectiascope:neversion:5.1.1

Trust: 0.3

vendor:ubuntumodel:linux lts sparcscope:eqversion:6.06

Trust: 0.3

vendor:ciscomodel:call manager es33scope:eqversion:4.1

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:4.3.1

Trust: 0.3

vendor:sybasemodel:easerverscope:eqversion:6.0

Trust: 0.3

vendor:ciscomodel:ons 15454sdhscope:eqversion:3.1

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:10.2

Trust: 0.3

vendor:vmwaremodel:workstationscope:eqversion:5.5.5

Trust: 0.3

vendor:s u s emodel:linux professionalscope:eqversion:9.1

Trust: 0.3

vendor:ciscomodel:call managerscope:eqversion:4.0

Trust: 0.3

vendor:freebsdmodel:-prereleasescope:eqversion:5.4

Trust: 0.3

vendor:sunmodel:jre 07scope:eqversion:1.4.1

Trust: 0.3

vendor:openvpnmodel:beta11scope:eqversion:2.0

Trust: 0.3

vendor:sybasemodel:rtdsscope:eqversion:3.1

Trust: 0.3

vendor:sunmodel:jsse 01scope:eqversion:1.0.3

Trust: 0.3

vendor:oraclemodel:http serverscope:eqversion:1.0.2.1

Trust: 0.3

vendor:sunmodel:java system web server sp8scope:eqversion:6.0

Trust: 0.3

vendor:sunmodel:java system application server 2004q2scope:eqversion:7.0

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:4.3.2

Trust: 0.3

vendor:iscmodel:bind bscope:eqversion:9.3.3

Trust: 0.3

vendor:vmwaremodel:workstationscope:eqversion:6.0.1

Trust: 0.3

vendor:openvpnmodel:openvpnscope:eqversion:2.0.3

Trust: 0.3

vendor:vmwaremodel:workstation buildscope:eqversion:5.5.444386

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.1.3.132

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:4.3.1

Trust: 0.3

vendor:sunmodel:java web proxy server sp3scope:eqversion:3.6

Trust: 0.3

vendor:sunmodel:jre 009scope:eqversion:1.1.6

Trust: 0.3

vendor:sshmodel:communications security ssh tectiascope:eqversion:2.1.3

Trust: 0.3

vendor:ciscomodel:secure acs for windows ntscope:eqversion:2.5

Trust: 0.3

vendor:beamodel:systems weblogic server for win32scope:eqversion:8.1

Trust: 0.3

vendor:sshmodel:communications security ssh tectia serverscope:eqversion:4.4

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.2

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:8.52

Trust: 0.3

vendor:netbsdmodel:netbsdscope:eqversion:3.0.2

Trust: 0.3

vendor:sunmodel:jre b 005scope:eqversion:1.1.7

Trust: 0.3

vendor:ciscomodel:security agentscope:eqversion:4.5.1.639

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.1.5

Trust: 0.3

vendor:redmodel:hat enterprise linux asscope:eqversion:2.1

Trust: 0.3

vendor:redhatmodel:desktopscope:eqversion:4.0

Trust: 0.3

vendor:debianmodel:linux hppascope:eqversion:3.1

Trust: 0.3

vendor:vmwaremodel:workstation buildscope:eqversion:5.5.342958

Trust: 0.3

vendor:sunmodel:jsse 02scope:eqversion:1.0.3

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.0

Trust: 0.3

vendor:ciscomodel:application & content networking softwarescope: - version: -

Trust: 0.3

vendor:sshmodel:communications security ssh tectia serverscope:eqversion:4.4.2

Trust: 0.3

vendor:redhatmodel:enterprise linux esscope:eqversion:3

Trust: 0.3

vendor:sunmodel:jre 11scope:eqversion:1.2.2

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:4.8

Trust: 0.3

vendor:attachmatemodel:reflectionscope:eqversion:8.0

Trust: 0.3

vendor:ciscomodel:security agentscope:eqversion:4.0.3.728

Trust: 0.3

vendor:ciscomodel:call managerscope:eqversion:4.3(1)

Trust: 0.3

vendor:ciscomodel:ciscoworks common management foundationscope:eqversion:2.1

Trust: 0.3

vendor:openvpnmodel:openvpnscope:neversion:2.0.8

Trust: 0.3

vendor:novellmodel:international cryptographic infrastructurescope:neversion:2.7.2

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:4.7

Trust: 0.3

vendor:sybasemodel:risk analytics platformscope:eqversion:2.0

Trust: 0.3

vendor:sybasemodel:rtdsscope:eqversion:4.0

Trust: 0.3

vendor:ciscomodel:ons optical transport platformscope:eqversion:154544.1

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:8.54

Trust: 0.3

vendor:operamodel:software opera web browser betascope:eqversion:83

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:3.3.1

Trust: 0.3

vendor:s u s emodel:linux professional x86 64scope:eqversion:9.1

Trust: 0.3

vendor:beamodel:systems weblogic express for win32scope:eqversion:7.0.0.1

Trust: 0.3

vendor:securemodel:computing snapgear u2scope:neversion:3.1.4

Trust: 0.3

vendor:beamodel:systems weblogic express spscope:eqversion:7.07

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:7.53

Trust: 0.3

vendor:openofficemodel:openofficescope:eqversion:2.4

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:4.1.1

Trust: 0.3

vendor:beamodel:systems weblogic serverscope:eqversion:7.0

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:7.21

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:3.2

Trust: 0.3

vendor:sunmodel:java system web server sp5scope:eqversion:6.0

Trust: 0.3

vendor:securemodel:computing snapgear sg580scope:eqversion:0

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.1.4

Trust: 0.3

vendor:ciscomodel:ons 15454e optical transport platformscope:eqversion:0

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.1.1

Trust: 0.3

vendor:sybasemodel:data auditingscope:eqversion:4.5.3

Trust: 0.3

vendor:openofficemodel:openofficescope:neversion:3.2

Trust: 0.3

vendor:vmwaremodel:playerscope:eqversion:1.0.5

Trust: 0.3

vendor:sybasemodel:afariascope:eqversion:5.0

Trust: 0.3

vendor:beamodel:systems weblogic express for win32 spscope:eqversion:8.11

Trust: 0.3

vendor:freebsdmodel:-release-p42scope:eqversion:4.4

Trust: 0.3

vendor:ciscomodel:ons mstpscope:eqversion:154540

Trust: 0.3

vendor:arkoonmodel:ssl360scope:neversion:2.0/3

Trust: 0.3

vendor:sunmodel:java system application server 2004q2 r1standardscope:eqversion:7.0

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:1.0.5

Trust: 0.3

vendor:ibmmodel:hardware management console for pseriesscope:eqversion:3.3.7

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:4.4

Trust: 0.3

vendor:sshmodel:communications security ssh tectia server for ibm z/osscope:eqversion:5.1

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:4.11

Trust: 0.3

vendor:sybasemodel:easerverscope:eqversion:5.2

Trust: 0.3

vendor:openvpnmodel:openvpnscope:eqversion:2.0.5

Trust: 0.3

vendor:ciscomodel:secure acs solution enginescope: - version: -

Trust: 0.3

vendor:openofficemodel:openofficescope:eqversion:2.2

Trust: 0.3

vendor:ciscomodel:ons optical transport platformscope:eqversion:154544.6(0)

Trust: 0.3

vendor:opensslmodel:project openssl bscope:eqversion:0.9.8

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:8.0

Trust: 0.3

vendor:sybasemodel:unwired orchestratorscope:eqversion:4.3

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.1.2

Trust: 0.3

vendor:sybasemodel:data direct odbc/ole-db drivers for asescope:eqversion:0

Trust: 0.3

vendor:sunmodel:java system web server sp3scope:eqversion:6.0

Trust: 0.3

vendor:avayamodel:s8500 r2.0.1scope: - version: -

Trust: 0.3

vendor:ibmmodel:hardware management console for pseries r1.0scope:eqversion:5.0

Trust: 0.3

vendor:sshmodel:communications security tectiascope:eqversion:2.0

Trust: 0.3

vendor:iscmodel:bind a5scope:eqversion:9.4

Trust: 0.3

vendor:sybasemodel:global fix litescope:eqversion:0

Trust: 0.3

vendor:sybasemodel:easerverscope:eqversion:5.3

Trust: 0.3

vendor:operamodel:software opera web browser win32 betascope:eqversion:7.01

Trust: 0.3

vendor:sshmodel:communications security ssh tectia managerscope:eqversion:2.1.3

Trust: 0.3

vendor:s u s emodel:linux personalscope:eqversion:9.1

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:4.6.2

Trust: 0.3

vendor:ciscomodel:ons optical transport platformscope:eqversion:154544.1(1)

Trust: 0.3

vendor:ciscomodel:works common servicesscope:eqversion:3.0

Trust: 0.3

vendor:ciscomodel:ons optical transport platformscope:eqversion:154544.6(1)

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:4.8

Trust: 0.3

vendor:operamodel:software opera web browser linuxscope:eqversion:6.0.1

Trust: 0.3

vendor:iscmodel:bind -p1scope:eqversion:9.2.6

Trust: 0.3

vendor:netscapemodel:netscapescope:eqversion:7.1

Trust: 0.3

vendor:sshmodel:communications security ssh tectia serverscope:neversion:4.4.7

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:7.22

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:4.2.1

Trust: 0.3

vendor:ibmmodel:hardware management console for iseries r5.0scope:eqversion:4.0

Trust: 0.3

vendor:ciscomodel:wide area application servicesscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:secure acs solution enginescope:eqversion:3.3.1

Trust: 0.3

vendor:ciscomodel:security agentscope:eqversion:4.0

Trust: 0.3

vendor:openofficemodel:openofficescope:eqversion:2.0.4

Trust: 0.3

vendor:hpmodel:virtualvault a.04.50scope: - version: -

Trust: 0.3

vendor:sunmodel:jdk 14scope:eqversion:1.1.8

Trust: 0.3

vendor:avayamodel:integrated managementscope: - version: -

Trust: 0.3

vendor:sunmodel:secure global desktopscope:eqversion:4.2

Trust: 0.3

vendor:ciscomodel:ons optical transport platformscope:eqversion:154544.14

Trust: 0.3

vendor:opensslmodel:project openssl gscope:eqversion:0.9.6

Trust: 0.3

vendor:iscmodel:bind a4scope:eqversion:9.4

Trust: 0.3

vendor:securemodel:computing snapgear sg560scope:eqversion:0

Trust: 0.3

vendor:s u s emodel:suse linux school server for i386scope: - version: -

Trust: 0.3

vendor:sshmodel:communications security ssh tectia connectorscope:eqversion:5.0.1

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:4.5

Trust: 0.3

vendor:openpkgmodel:currentscope: - version: -

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:4.2

Trust: 0.3

vendor:sunmodel:jre 10scope:eqversion:1.1.8

Trust: 0.3

vendor:sybasemodel:rtdsscope:eqversion:2.0

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:4.3.4

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:4.3

Trust: 0.3

vendor:sunmodel:one web serverscope:eqversion:6.0

Trust: 0.3

vendor:iscmodel:bind rc2scope:eqversion:9.2.7

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.0

Trust: 0.3

vendor:beamodel:systems weblogic express for win32scope:eqversion:8.1

Trust: 0.3

vendor:sshmodel:communications security ssh tectia managerscope:neversion:2.2.1

Trust: 0.3

vendor:sybasemodel:rtdsscope:eqversion:3.5

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:5.1

Trust: 0.3

vendor:ciscomodel:secure acs for windows ntscope:eqversion:2.3

Trust: 0.3

vendor:beamodel:systems weblogic express for win32 spscope:eqversion:7.07

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:5.2.1

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:4.11

Trust: 0.3

vendor:ciscomodel:call manager es07scope:eqversion:4.1

Trust: 0.3

vendor:beamodel:systems weblogic server spscope:eqversion:7.04

Trust: 0.3

vendor:sshmodel:communications security ssh tectia serverscope:eqversion:4.4.1

Trust: 0.3

vendor:sunmodel:jdk 1.5.0.0 04scope: - version: -

Trust: 0.3

vendor:sunmodel:java system web server sp5scope:eqversion:6.1

Trust: 0.3

vendor:sybasemodel:workspacescope:eqversion:1.5

Trust: 0.3

vendor:s u s emodel:tomboyscope:eqversion:9.3

Trust: 0.3

vendor:ibmmodel:hardware management console for iseries r1.0scope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux ia-64scope:eqversion:3.1

Trust: 0.3

vendor:sunmodel:one application server platform editionscope:eqversion:7.0

Trust: 0.3

vendor:redhatmodel:enterprise linux wsscope:eqversion:4

Trust: 0.3

vendor:attachmatemodel:reflectionscope:eqversion:x0

Trust: 0.3

vendor:opensslmodel:project openssl hscope:eqversion:0.9.6

Trust: 0.3

vendor:freebsdmodel:-stablescope:eqversion:5.5

Trust: 0.3

vendor:sybasemodel:ecdascope:eqversion:12.6

Trust: 0.3

vendor:sshmodel:communications security ssh tectia managerscope:eqversion:2.2

Trust: 0.3

vendor:operamodel:software opera web browser jscope:eqversion:7.11

Trust: 0.3

vendor:opensslmodel:project openssl ascope:eqversion:0.9.5

Trust: 0.3

vendor:opensslmodel:project openssl iscope:eqversion:0.9.6

Trust: 0.3

vendor:ciscomodel:security agentscope:eqversion:4.5.1

Trust: 0.3

vendor:iscmodel:bind rc2scope:eqversion:9.3.3

Trust: 0.3

vendor:ciscomodel:secure acs for windows ntscope:eqversion:3.0.1

Trust: 0.3

vendor:ciscomodel:secure acs for windows ntscope:eqversion:3.1.1

Trust: 0.3

vendor:openvpnmodel:openvpnscope:eqversion:2.0.4

Trust: 0.3

vendor:mandrakesoftmodel:corporate server x86 64scope:eqversion:3.0

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.1.2

Trust: 0.3

vendor:ciscomodel:ons 15454sdhscope:eqversion:3.4

Trust: 0.3

vendor:sybasemodel:appeonscope:eqversion:5.0

Trust: 0.3

vendor:sunmodel:solaris 8 x86scope: - version: -

Trust: 0.3

vendor:redhatmodel:enterprise linux esscope:eqversion:2.1

Trust: 0.3

vendor:openofficemodel:openofficescope:eqversion:2.0.1

Trust: 0.3

vendor:sunmodel:one web server sp9scope:eqversion:6.0

Trust: 0.3

vendor:ciscomodel:secure acs solution enginescope:eqversion:3.3

Trust: 0.3

vendor:sshmodel:communications security ssh tectia connectorscope:neversion:5.0.3

Trust: 0.3

vendor:ciscomodel:secure acs for unixscope:eqversion:2.3

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:4.7

Trust: 0.3

vendor:netbsdmodel:netbsdscope:eqversion:2.0.4

Trust: 0.3

vendor:opensslmodel:project openssl cscope:eqversion:0.9.6

Trust: 0.3

vendor:beamodel:systems weblogic server spscope:eqversion:7.0.0.12

Trust: 0.3

vendor:ciscomodel:secure acs for windows ntscope:eqversion:2.42

Trust: 0.3

vendor:sshmodel:communications security ssh tectia serverscope:eqversion:4.2

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.1

Trust: 0.3

vendor:oraclemodel:http serverscope:eqversion:9.0.2

Trust: 0.3

vendor:beamodel:systems weblogic server for win32 spscope:eqversion:7.0.0.12

Trust: 0.3

vendor:oraclemodel:http serverscope:eqversion:9.1

Trust: 0.3

vendor:debianmodel:linux amd64scope:eqversion:3.1

Trust: 0.3

vendor:ciscomodel:call manager es50scope:eqversion:4.1

Trust: 0.3

vendor:opensslmodel:project opensslscope:eqversion:0.9.3

Trust: 0.3

vendor:oraclemodel:http serverscope:eqversion:8.1.7

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:8.50

Trust: 0.3

vendor:opensslmodel:project openssl cscope:eqversion:0.9.1

Trust: 0.3

vendor:sybasemodel:workspacescope:eqversion:1.0

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:5.04

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:4.5

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:5.0

Trust: 0.3

vendor:mandrakesoftmodel:corporate serverscope:eqversion:3.0

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:6.06

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:6.0.1

Trust: 0.3

vendor:openpkgmodel:openpkgscope:eqversion:2.4

Trust: 0.3

vendor:sybasemodel:ecdascope:eqversion:12.5

Trust: 0.3

vendor:sunmodel:jre 07scope:eqversion:1.2.2

Trust: 0.3

vendor:avayamodel:s8500 r2.0.0scope: - version: -

Trust: 0.3

vendor:avayamodel:s8700 r2.0.0scope: - version: -

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.2.1

Trust: 0.3

vendor:sunmodel:sdk 05ascope:eqversion:1.2.2

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.10

Trust: 0.3

vendor:beamodel:systems weblogic server for win32scope:eqversion:9.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.9

Trust: 0.3

vendor:operamodel:software opera web browser linuxscope:eqversion:6.0.3

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:5.1

Trust: 0.3

vendor:sunmodel:java web proxy server sp4scope:eqversion:3.6

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:4.3.3

Trust: 0.3

vendor:opensslmodel:project openssl ascope:eqversion:0.9.8

Trust: 0.3

vendor:redmodel:hat network satellite (for rhelscope:eqversion:3)4.2

Trust: 0.3

vendor:vmwaremodel:serverscope:eqversion:1.0.3

Trust: 0.3

vendor:sybasemodel:eii avaki sdfscope:eqversion:3.0

Trust: 0.3

vendor:ciscomodel:ons optical transport platformscope:eqversion:154544.1(2)

Trust: 0.3

vendor:openofficemodel:openofficescope:eqversion:3.1

Trust: 0.3

vendor:openpkgmodel:openpkgscope:eqversion:2.2

Trust: 0.3

vendor:operamodel:software opera web browser beta buildscope:eqversion:7.2012981

Trust: 0.3

vendor:opensslmodel:project openssl cscope:eqversion:0.9.7

Trust: 0.3

vendor:freebsdmodel:-release-p20scope:eqversion:4.11

Trust: 0.3

vendor:ciscomodel:security agentscope:eqversion:4.0.3

Trust: 0.3

vendor:oraclemodel:http serverscope:eqversion:9.2.8

Trust: 0.3

vendor:iscmodel:bind b1scope:eqversion:9.3.3

Trust: 0.3

vendor:trustixmodel:secure linuxscope:eqversion:2.2

Trust: 0.3

vendor:ciscomodel:security marsscope:eqversion:4.2.2

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9

Trust: 0.3

vendor:sybasemodel:eii avaki sdfscope:eqversion:6.2

Trust: 0.3

vendor:opensslmodel:project openssl lscope:eqversion:0.9.6

Trust: 0.3

vendor:openvpnmodel:openvpnscope:eqversion:2.0.1

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:4.6

Trust: 0.3

vendor:sunmodel:sdk 003scope:eqversion:1.2.1

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:8.53

Trust: 0.3

vendor:attachmatemodel:reflection sp1scope:neversion:14.0

Trust: 0.3

vendor:oraclemodel:http serverscope:eqversion:9.0.2.3

Trust: 0.3

vendor:sunmodel:sdkscope:eqversion:1.2.2

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:4.4.1

Trust: 0.3

vendor:sunmodel:java system web serverscope:eqversion:6.1

Trust: 0.3

vendor:netbsdmodel:netbsdscope:eqversion:2.0.1

Trust: 0.3

vendor:sybasemodel:rfid enterprisescope:eqversion:2.0

Trust: 0.3

vendor:netbsdmodel:current pre20010701scope: - version: -

Trust: 0.3

vendor:beamodel:systems weblogic server spscope:eqversion:8.15

Trust: 0.3

vendor:turbolinuxmodel:f...scope:eqversion:10

Trust: 0.3

vendor:ciscomodel:ons optical transport platformscope:eqversion:154543.0

Trust: 0.3

vendor:sunmodel:jdk bscope:eqversion:1.1.7

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.2.6

Trust: 0.3

vendor:beamodel:systems weblogic server for win32 spscope:eqversion:8.15

Trust: 0.3

vendor:freebsdmodel:-release-p38scope:eqversion:4.3

Trust: 0.3

vendor:hpmodel:hp-ux b.11.00scope: - version: -

Trust: 0.3

vendor:hpmodel:hp-ux b.11.31scope: - version: -

Trust: 0.3

vendor:s u s emodel:linux personal x86 64scope:eqversion:9.2

Trust: 0.3

vendor:opensslmodel:project openssl escope:eqversion:0.9.6

Trust: 0.3

vendor:beamodel:systems weblogic server spscope:eqversion:8.14

Trust: 0.3

vendor:beamodel:systems weblogic express spscope:eqversion:7.0.0.13

Trust: 0.3

vendor:ciscomodel:ciscoworks common management foundationscope:eqversion:0

Trust: 0.3

vendor:sybasemodel:corp bankingscope:eqversion:0

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.2.4

Trust: 0.3

vendor:opensslmodel:project opensslscope:eqversion:0.9.6

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:4.2.2

Trust: 0.3

vendor:beamodel:systems weblogic server for win32 spscope:eqversion:8.14

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:5.0

Trust: 0.3

vendor:sunmodel:java system application server enterprise editionscope:eqversion:7.0

Trust: 0.3

vendor:redmodel:hat enterprise linux asscope:eqversion:4

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:4.2

Trust: 0.3

vendor:ciscomodel:secure acs for windows ntscope:eqversion:2.4

Trust: 0.3

vendor:debianmodel:linux s/390scope:eqversion:3.1

Trust: 0.3

vendor:s u s emodel:tomboyscope:eqversion:10.0

Trust: 0.3

vendor:mandrivamodel:linux mandrake x86 64scope:eqversion:2007.0

Trust: 0.3

vendor:ciscomodel:secure acs for unixscope:eqversion:2.3.5.1

Trust: 0.3

vendor:susemodel:linux enterprise serverscope:eqversion:10

Trust: 0.3

vendor:vmwaremodel:esx serverscope:eqversion:2.1.3

Trust: 0.3

vendor:openofficemodel:openofficescope:eqversion:2.2.1

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:10.0

Trust: 0.3

vendor:sshmodel:communications security ssh tectia server for ibm z/osscope:neversion:5.1.1

Trust: 0.3

vendor:ubuntumodel:linux lts powerpcscope:eqversion:6.06

Trust: 0.3

vendor:opensslmodel:project openssl beta3scope:eqversion:0.9.7

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:6.10

Trust: 0.3

vendor:vmwaremodel:esx serverscope:eqversion:2.0.2

Trust: 0.3

vendor:sshmodel:communications security ssh tectia kscope:eqversion:4.3.9

Trust: 0.3

vendor:sunmodel:one web server sp8scope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux sparcscope:eqversion:3.1

Trust: 0.3

vendor:beamodel:systems weblogic express spscope:eqversion:8.12

Trust: 0.3

vendor:operamodel:software opera web browser linuxscope:eqversion:6.10

Trust: 0.3

vendor:beamodel:systems weblogic express spscope:eqversion:7.0.0.11

Trust: 0.3

vendor:freebsdmodel:-stablescope:eqversion:4.4

Trust: 0.3

vendor:redmodel:hat red hat network satellite serverscope:eqversion:4.2

Trust: 0.3

vendor:operamodel:software opera web browser win32scope:eqversion:6.0.5

Trust: 0.3

vendor:sunmodel:java system application server 2004q2 r1enterprisescope:eqversion:7.0

Trust: 0.3

vendor:ubuntumodel:linux sparcscope:eqversion:6.10

Trust: 0.3

vendor:freebsdmodel:5.4-stablescope: - version: -

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:4.0

Trust: 0.3

vendor:iscmodel:bind a6scope:eqversion:9.4

Trust: 0.3

vendor:vmwaremodel:playerscope:eqversion:1.0.3

Trust: 0.3

vendor:sunmodel:jdk 02scope:eqversion:1.4.2

Trust: 0.3

vendor:avayamodel:message networkingscope: - version: -

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:4.9

Trust: 0.3

vendor:sshmodel:communications security ssh tectiascope:eqversion:2.1.2

Trust: 0.3

vendor:ciscomodel:ons 15454sdhscope:eqversion:4.0(0)

Trust: 0.3

vendor:turbolinuxmodel:serverscope:eqversion:8.0

Trust: 0.3

vendor:freebsdmodel:-release-p8scope:eqversion:4.10

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:1.0.3

Trust: 0.3

vendor:redhatmodel:desktopscope:eqversion:3.0

Trust: 0.3

vendor:sshmodel:communications security ssh tectia jscope:eqversion:4.3.1

Trust: 0.3

vendor:freebsdmodel:-release-p17scope:eqversion:4.7

Trust: 0.3

vendor:trustixmodel:secure enterprise linuxscope:eqversion:2.0

Trust: 0.3

vendor:sybasemodel:rfid enterprisescope:eqversion:2.2

Trust: 0.3

vendor:ciscomodel:call manager es24scope:eqversion:4.1

Trust: 0.3

vendor:sybasemodel:powerbuilderscope:eqversion:9.0

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:4.3.2

Trust: 0.3

vendor:attachmatemodel:reflectionscope:eqversion:14.0

Trust: 0.3

vendor:attachmatemodel:reflectionscope:eqversion:13.0.4

Trust: 0.3

vendor:ciscomodel:gss global site selectorscope:eqversion:44910

Trust: 0.3

vendor:avayamodel:s8300 r2.0.1scope: - version: -

Trust: 0.3

vendor:operamodel:software opera web browser .6win32scope:eqversion:6.0

Trust: 0.3

vendor:sunmodel:sdk 02scope:eqversion:1.4.2

Trust: 0.3

vendor:sunmodel:sdk 11scope:eqversion:1.2.2

Trust: 0.3

vendor:freebsdmodel:-prereleasescope:eqversion:4.8

Trust: 0.3

vendor:beamodel:systems weblogic express spscope:eqversion:8.11

Trust: 0.3

vendor:hpmodel:openvms secure web serverscope:eqversion:1.1-1

Trust: 0.3

vendor:sybasemodel:data integration suite discope:eqversion:1.0

Trust: 0.3

vendor:susemodel:linux enterprise sdkscope:eqversion:10

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:3.2.1

Trust: 0.3

vendor:attachmatemodel:reflectionscope:eqversion:13.0

Trust: 0.3

vendor:sybasemodel:rtdsscope:eqversion:3.0

Trust: 0.3

vendor:beamodel:systems weblogic server spscope:eqversion:7.0.0.14

Trust: 0.3

vendor:sunmodel:java web proxy server sp7scope:eqversion:3.6

Trust: 0.3

vendor:beamodel:systems weblogic serverscope:eqversion:9.0

Trust: 0.3

vendor:sunmodel:java system application server platform edition q1 ur1scope:eqversion:8.12005

Trust: 0.3

vendor:sybasemodel:data auditingscope:eqversion:4.5.2

Trust: 0.3

vendor:sshmodel:communications security ssh tectia jscope:neversion:4.3.3

Trust: 0.3

vendor:beamodel:systems weblogic express spscope:eqversion:7.05

Trust: 0.3

vendor:openbsdmodel:openbsdscope:eqversion:3.9

Trust: 0.3

vendor:freebsdmodel:-stablescope:eqversion:4.3

Trust: 0.3

vendor:attachmatemodel:reflection for secure it sp1scope:neversion:6.1

Trust: 0.3

vendor:sshmodel:communications security ssh tectiascope:eqversion:1.4

Trust: 0.3

vendor:sshmodel:communications security ssh tectia connectorscope:eqversion:5.0.2

Trust: 0.3

vendor:openpkgmodel:stablescope: - version: -

Trust: 0.3

vendor:sunmodel:java system web server sp10scope:eqversion:6.0

Trust: 0.3

vendor:sunmodel:sdk 14scope:eqversion:1.2.2

Trust: 0.3

vendor:freebsdmodel:4.10-prereleasescope: - version: -

Trust: 0.3

vendor:sunmodel:java enterprise system 2005q1scope: - version: -

Trust: 0.3

vendor:sunmodel:sdk 01scope:eqversion:1.4.2

Trust: 0.3

vendor:attachmatemodel:reflection sftp clientscope:eqversion:6.0

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:6.10

Trust: 0.3

vendor:sshmodel:communications security ssh tectiascope:eqversion:2.0

Trust: 0.3

vendor:sunmodel:solaris 8 sparcscope: - version: -

Trust: 0.3

vendor:redmodel:hat red hat network satellite serverscope:eqversion:5.0

Trust: 0.3

vendor:sybasemodel:afariascope:eqversion:5.1

Trust: 0.3

vendor:avayamodel:s8700 cmscope:eqversion:3.1

Trust: 0.3

vendor:s u s emodel:linux professional ossscope:eqversion:10.0

Trust: 0.3

vendor:mandrivamodel:linux mandrakescope:eqversion:2007.0

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:4.0

Trust: 0.3

vendor:susemodel:linux enterprise serverscope:eqversion:8

Trust: 0.3

vendor:hpmodel:system management homepagescope:neversion:2.1.9

Trust: 0.3

vendor:openofficemodel:openofficescope:eqversion:2.0.2

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:4.2.3

Trust: 0.3

vendor:s u s emodel:linux professional x86 64scope:eqversion:9.3

Trust: 0.3

vendor:trustixmodel:secure linuxscope:eqversion:3.0

Trust: 0.3

vendor:beamodel:systems weblogic express spscope:eqversion:7.02

Trust: 0.3

vendor:turbolinuxmodel:appliance server workgroup editionscope:eqversion:1.0

Trust: 0.3

vendor:sunmodel:java system application server platform edition q1scope:eqversion:8.12005

Trust: 0.3

vendor:vmwaremodel:player buildscope:neversion:1.0.680404

Trust: 0.3

vendor:avayamodel:s8710 cmscope:eqversion:3.1

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:4.9

Trust: 0.3

vendor:freebsdmodel:-stablescope:eqversion:4.7

Trust: 0.3

vendor:sybasemodel:iq extended enterpirse editionscope:eqversion:12.7

Trust: 0.3

vendor:beamodel:systems weblogic expressscope:eqversion:7.0

Trust: 0.3

vendor:sunmodel:jdk 13scope:eqversion:1.1.8

Trust: 0.3

vendor:beamodel:systems weblogic express for win32 spscope:eqversion:8.12

Trust: 0.3

vendor:beamodel:systems weblogic express for win32 spscope:eqversion:7.0.0.11

Trust: 0.3

vendor:sunmodel:java system application server standard 2004q2 r5scope:eqversion:7.0.0

Trust: 0.3

vendor:ciscomodel:ons optical transport platformscope:eqversion:154543.2.0

Trust: 0.3

vendor:iscmodel:bind rc3scope:neversion:9.2.7

Trust: 0.3

vendor:freebsdmodel:-stablescope:eqversion:6.1

Trust: 0.3

vendor:sunmodel:sdk 07ascope:eqversion:1.2.2

Trust: 0.3

vendor:ciscomodel:call manager es32scope:eqversion:4.1

Trust: 0.3

vendor:avayamodel:interactive responsescope: - version: -

Trust: 0.3

vendor:ciscomodel:call managerscope:eqversion:3.3

Trust: 0.3

vendor:freebsdmodel:-release-p20scope:eqversion:4.6

Trust: 0.3

vendor:sybasemodel:unwired accelerator and enterprise portalscope:eqversion:6.0

Trust: 0.3

vendor:ciscomodel:security agentscope:eqversion:4.0.2

Trust: 0.3

vendor:ciscomodel:secure acs for windows ntscope:eqversion:2.6

Trust: 0.3

vendor:openofficemodel:openofficescope:eqversion:2.4.1

Trust: 0.3

vendor:operamodel:software opera web browser macscope:eqversion:5.0

Trust: 0.3

vendor:sybasemodel:eii avaki sdfscope:eqversion:6.1

Trust: 0.3

vendor:sunmodel:java system application server enterprise edition 2005q1rhel2.1/rhel3scope:eqversion:8.1

Trust: 0.3

vendor:sshmodel:communications security ssh tectia managerscope:eqversion:2.1.2

Trust: 0.3

vendor:ciscomodel:secure acs for windows ntscope:eqversion:2.6.3

Trust: 0.3

vendor:novellmodel:international cryptographic infostructurescope:eqversion:2.6.1

Trust: 0.3

vendor:sshmodel:communications security ssh tectia kscope:eqversion:4.3.8

Trust: 0.3

vendor:debianmodel:linux ppcscope:eqversion:3.1

Trust: 0.3

vendor:opensslmodel:project openssl ascope:eqversion:0.9.7

Trust: 0.3

vendor:ciscomodel:ons optical transport platformscope:eqversion:154544.1(3)

Trust: 0.3

vendor:mandrakesoftmodel:multi network firewallscope:eqversion:2.0

Trust: 0.3

vendor:operamodel:software opera web browser bscope:eqversion:7.11

Trust: 0.3

vendor:vmwaremodel:workstation buildscope:neversion:5.5.680404

Trust: 0.3

vendor:freebsdmodel:-stablescope:eqversion:5.3

Trust: 0.3

vendor:opensslmodel:project openssl kscope:neversion:0.9.7

Trust: 0.3

vendor:sshmodel:communications security ssh tectia connectorscope:eqversion:5.0

Trust: 0.3

vendor:iscmodel:bind rc1scope:eqversion:9.2.7

Trust: 0.3

vendor:sunmodel:java system application server standard 2004q2 r4scope:eqversion:7.0.0

Trust: 0.3

vendor:rpathmodel:linuxscope:eqversion:1

Trust: 0.3

vendor:iscmodel:bind rc3scope:neversion:9.3.3

Trust: 0.3

vendor:ciscomodel:call manager sr2scope:eqversion:4.1

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9.01

Trust: 0.3

vendor:s u s emodel:linux personalscope:eqversion:9.3

Trust: 0.3

vendor:ciscomodel:call manager sr2bscope:eqversion:4.0

Trust: 0.3

vendor:turbolinuxmodel:serverscope:eqversion:7.0

Trust: 0.3

vendor:sunmodel:java system application server 2004q2 r2 enterprisescope:eqversion:7.0

Trust: 0.3

vendor:sunmodel:java system web server sp6scope:eqversion:6.0

Trust: 0.3

vendor:netbsdmodel:current augustscope:eqversion:232006

Trust: 0.3

vendor:ciscomodel:ons 15454sdhscope:eqversion:4.6(0)

Trust: 0.3

vendor:ubuntumodel:linux lts i386scope:eqversion:6.06

Trust: 0.3

vendor:avayamodel:messaging storage serverscope: - version: -

Trust: 0.3

vendor:sunmodel:jre 05ascope:eqversion:1.2.2

Trust: 0.3

vendor:redhatmodel:enterprise linux esscope:eqversion:4

Trust: 0.3

vendor:openvpnmodel:openvpnscope:eqversion:2.0.2

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.2.2

Trust: 0.3

vendor:sunmodel:sdk 007scope:eqversion:1.1.8

Trust: 0.3

vendor:operamodel:software opera web browser win32scope:eqversion:7.0

Trust: 0.3

vendor:beamodel:systems weblogic express for win32 spscope:eqversion:7.05

Trust: 0.3

vendor:sunmodel:one web server sp3scope:eqversion:6.0

Trust: 0.3

vendor:avayamodel:intuity lxscope: - version: -

Trust: 0.3

vendor:operamodel:software opera web browser win32scope:eqversion:6.0.1

Trust: 0.3

vendor:netbsdmodel:netbsdscope:eqversion:2.0

Trust: 0.3

vendor:ciscomodel:secure acs for windows ntscope:eqversion:3.1

Trust: 0.3

vendor:beamodel:systems weblogic server spscope:eqversion:8.13

Trust: 0.3

vendor:s u s emodel:linux personal x86 64scope:eqversion:9.1

Trust: 0.3

vendor:ciscomodel:security agentscope:eqversion:3.x

Trust: 0.3

vendor:ciscomodel:ons optical transport platformscope:eqversion:154544.0(1)

Trust: 0.3

vendor:netbsdmodel:netbsdscope:eqversion:2.0.2

Trust: 0.3

vendor:attachmatemodel:reflection for secure itscope:eqversion:6.0

Trust: 0.3

vendor:sunmodel:jre 003scope:eqversion:1.2.2

Trust: 0.3

vendor:openofficemodel:openofficescope:eqversion:2.4.3

Trust: 0.3

vendor:sunmodel:jdk 15scope:eqversion:1.1.8

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:7.11

Trust: 0.3

vendor:beamodel:systems weblogic server for win32 spscope:eqversion:8.13

Trust: 0.3

vendor:sshmodel:communications security ssh tectia managerscope:eqversion:2.0

Trust: 0.3

vendor:avayamodel:cvlanscope: - version: -

Trust: 0.3

vendor:sunmodel:jre 099scope:eqversion:1.1.8

Trust: 0.3

vendor:sunmodel:java system application server 2004q2 r3 enterprisescope:eqversion:7.0

Trust: 0.3

vendor:sunmodel:java enterprise system 2003q4scope: - version: -

Trust: 0.3

vendor:netscapemodel:netscapescope:eqversion:7.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.8

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:4.3.4

Trust: 0.3

vendor:sunmodel:java system application server 2004q2 r3 standardscope:eqversion:7.0

Trust: 0.3

vendor:iscmodel:bind a2scope:eqversion:9.4

Trust: 0.3

vendor:sunmodel:jre betascope:eqversion:1.5.0

Trust: 0.3

vendor:operamodel:software opera web browser win32scope:eqversion:5.10

Trust: 0.3

vendor:beamodel:systems weblogic express for win32 spscope:eqversion:7.01

Trust: 0.3

vendor:sunmodel:java system application server 2004q2scope:eqversion:7

Trust: 0.3

vendor:beamodel:systems weblogic express for win32 spscope:eqversion:7.06

Trust: 0.3

vendor:beamodel:systems weblogic express for win32 spscope:eqversion:7.02

Trust: 0.3

vendor:openvpnmodel:openvpnscope:eqversion:2.0.6

Trust: 0.3

vendor:debianmodel:linux mipsscope:eqversion:3.1

Trust: 0.3

vendor:pardusmodel:linuxscope:eqversion:20090

Trust: 0.3

vendor:freebsdmodel:-stablescope:eqversion:4.2

Trust: 0.3

vendor:iscmodel:bind a3scope:eqversion:9.4

Trust: 0.3

vendor:beamodel:systems weblogic server spscope:eqversion:7.03

Trust: 0.3

vendor:vmwaremodel:acescope:eqversion:2.0

Trust: 0.3

vendor:netbsdmodel:3.1 rc3scope: - version: -

Trust: 0.3

vendor:sybasemodel:e-biz impactscope:eqversion:5.5

Trust: 0.3

vendor:sybasemodel:asescope:eqversion:11.5

Trust: 0.3

vendor:beamodel:systems weblogic server for win32 spscope:eqversion:7.03

Trust: 0.3

vendor:hpmodel:hp-ux b.11.23scope: - version: -

Trust: 0.3

vendor:ubuntumodel:linux sparcscope:eqversion:5.10

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:8.02

Trust: 0.3

vendor:ipcopmodel:ipcopscope:eqversion:1.4.12

Trust: 0.3

vendor:sunmodel:jrescope:eqversion:1.1.6

Trust: 0.3

vendor:vmwaremodel:esx serverscope:eqversion:3.0

Trust: 0.3

vendor:sunmodel:java system application server enterprise 2004q2 r5scope:eqversion:7.0.0

Trust: 0.3

vendor:opensslmodel:project opensslscope:eqversion:0.9.8

Trust: 0.3

vendor:freebsdmodel:-release-p7scope:eqversion:4.8

Trust: 0.3

vendor:sybasemodel:unwired accelerator and enterprise portalscope:eqversion:8.0

Trust: 0.3

vendor:sunmodel:one web server sp6scope:eqversion:6.0

Trust: 0.3

vendor:sunmodel:jre 14scope:eqversion:1.1.8

Trust: 0.3

vendor:beamodel:systems weblogic server for win32scope:eqversion:7.0

Trust: 0.3

vendor:sunmodel:jre 13scope:eqversion:1.1.8

Trust: 0.3

vendor:sybasemodel:powerbuilderscope:eqversion:10.5

Trust: 0.3

vendor:ciscomodel:secure acs for windows ntscope:eqversion:3.2

Trust: 0.3

vendor:redhatmodel:enterprise linux extrasscope:eqversion:3

Trust: 0.3

vendor:sunmodel:jdk 12scope:eqversion:1.1.8

Trust: 0.3

vendor:iscmodel:bind b3scope:neversion:9.4

Trust: 0.3

vendor:sybasemodel:mach desktopscope:eqversion:2.2.1

Trust: 0.3

vendor:ciscomodel:ons 15454sdhscope:eqversion:4.6(1)

Trust: 0.3

vendor:sunmodel:jdk 11scope:eqversion:1.1.8

Trust: 0.3

vendor:sgimodel:advanced linux environmentscope:eqversion:3.0

Trust: 0.3

vendor:sunmodel:secure global desktopscope:neversion:4.3

Trust: 0.3

vendor:opensslmodel:project opensslscope:eqversion:0.9.4

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.2.5

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:8.0.2

Trust: 0.3

vendor:sshmodel:communications security ssh tectia managerscope:neversion:2.1.4

Trust: 0.3

vendor:ipcopmodel:ipcopscope:neversion:1.4.13

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:10.1

Trust: 0.3

vendor:beamodel:systems weblogic server for win32 spscope:eqversion:7.04

Trust: 0.3

vendor:ciscomodel:security agentscope:eqversion:4.0.1

Trust: 0.3

vendor:vmwaremodel:playerscope:eqversion:2.0.1

Trust: 0.3

vendor:sunmodel:one web server sp10scope:eqversion:6.0

Trust: 0.3

vendor:openpkgmodel:openpkgscope:eqversion:2.0

Trust: 0.3

vendor:sybasemodel:eii avaki sdfscope:eqversion:7.0

Trust: 0.3

vendor:avayamodel:aura sip enablement servicesscope:eqversion:3.1

Trust: 0.3

vendor:sunmodel:java system application server standard platform q1scope:eqversion:8.12005

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:7.52

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:4.10

Trust: 0.3

vendor:redhatmodel:red hat network satellite (for rhelscope:eqversion:3)4.2

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:4.6

Trust: 0.3

vendor:arkoonmodel:ssl360scope:eqversion:2.0/2

Trust: 0.3

vendor:hpmodel:webproxy a.02.10scope: - version: -

Trust: 0.3

vendor:openofficemodel:openofficescope:eqversion:2.4.2

Trust: 0.3

vendor:sunmodel:java system application server enterprise 2004q2 r4scope:eqversion:7.0.0

Trust: 0.3

vendor:sunmodel:java system web server sp3scope:eqversion:6.1

Trust: 0.3

vendor:securemodel:computing snapgear sg710scope:eqversion:0

Trust: 0.3

vendor:ciscomodel:call manager es62scope:eqversion:4.0

Trust: 0.3

vendor:sunmodel:java system web server sp4scope:eqversion:6.0

Trust: 0.3

vendor:ciscomodel:secure acs buildscope:neversion:4.1(1)23

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.11

Trust: 0.3

vendor:sunmodel:one web server sp5scope:eqversion:6.0

Trust: 0.3

vendor:s u s emodel:linux personalscope:eqversion:8.2

Trust: 0.3

vendor:opensslmodel:project openssl cscope:neversion:0.9.8

Trust: 0.3

vendor:hpmodel:openvms secure web serverscope:neversion:2.2

Trust: 0.3

vendor:vmwaremodel:acescope:neversion:2.0.3

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:5.10

Trust: 0.3

vendor:sybasemodel:bpi for healthcarescope:eqversion:2.2

Trust: 0.3

vendor:sunmodel:jdk 099scope:eqversion:1.1.8

Trust: 0.3

vendor:sunmodel:jre 006scope:eqversion:1.2.2

Trust: 0.3

vendor:avayamodel:s8500scope:eqversion:0

Trust: 0.3

vendor:operamodel:software opera web browser win32scope:eqversion:6.0.3

Trust: 0.3

vendor:ciscomodel:secure acs for windows ntscope:eqversion:3.3

Trust: 0.3

vendor:sybasemodel:powerbuilderscope:eqversion:10.2.0

Trust: 0.3

vendor:beamodel:systems weblogic server spscope:eqversion:7.0.0.13

Trust: 0.3

vendor:hpmodel:webproxy a.02.00scope: - version: -

Trust: 0.3

vendor:beamodel:systems weblogic serverscope:eqversion:7.0.0.1

Trust: 0.3

vendor:hpmodel:virtualvault a.04.70scope: - version: -

Trust: 0.3

vendor:redhatmodel:network satellite (for rhelscope:eqversion:4)5.1

Trust: 0.3

vendor:sunmodel:jdkscope:eqversion:1.1.6

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:11.0

Trust: 0.3

vendor:sunmodel:sdk 02scope:eqversion:1.3

Trust: 0.3

vendor:avayamodel:s8710 r2.0.1scope: - version: -

Trust: 0.3

vendor:ibmmodel:hardware management console for pseries r1.0scope:eqversion:6.0

Trust: 0.3

vendor:redhatmodel:advanced workstation for the itanium processor ia64scope:eqversion:2.1

Trust: 0.3

vendor:sybasemodel:e-biz impactscope:eqversion:5.4.5

Trust: 0.3

vendor:sunmodel:java system application server enterprise edition q1scope:eqversion:8.12005

Trust: 0.3

vendor:opensslmodel:project openssl jscope:eqversion:0.9.7

Trust: 0.3

vendor:slackwaremodel:linux -currentscope: - version: -

Trust: 0.3

vendor:iscmodel:bind -p2scope:neversion:9.3.2

Trust: 0.3

vendor:turbolinuxmodel:homescope: - version: -

Trust: 0.3

vendor:vmwaremodel:serverscope:eqversion:1.0.4

Trust: 0.3

vendor:ciscomodel:ons optical transport platformscope:eqversion:154543.3

Trust: 0.3

vendor:sybasemodel:easerverscope:eqversion:5.0

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:4.4.1

Trust: 0.3

vendor:ciscomodel:ons 15454sdhscope:eqversion:4.5

Trust: 0.3

vendor:sshmodel:communications security ssh tectia jscope:eqversion:4.0

Trust: 0.3

vendor:ciscomodel:ons optical transport platformscope:eqversion:154544.0

Trust: 0.3

vendor:gentoomodel:linuxscope: - version: -

Trust: 0.3

vendor:sunmodel:jdk 1.5.0.0 03scope: - version: -

Trust: 0.3

vendor:turbolinuxmodel:desktopscope:eqversion:10.0

Trust: 0.3

vendor:opensslmodel:project openssl kscope:eqversion:0.9.6

Trust: 0.3

vendor:redhatmodel:advanced workstation for the itanium processorscope:eqversion:2.1

Trust: 0.3

vendor:turbolinuxmodel:serverscope:eqversion:10.0

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:4.1

Trust: 0.3

vendor:s u s emodel:novell linux posscope:eqversion:9

Trust: 0.3

vendor:ciscomodel:ons optical transport platformscope:eqversion:154542.3(5)

Trust: 0.3

vendor:arkoonmodel:ssl360scope:eqversion:1.0

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:4.10

Trust: 0.3

vendor:openofficemodel:openofficescope:eqversion:2.0.3-1

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.1

Trust: 0.3

vendor:sunmodel:jdk 10scope:eqversion:1.1.8

Trust: 0.3

vendor:sunmodel:solaris 10 x86scope: - version: -

Trust: 0.3

vendor:sybasemodel:ffi uofxscope:eqversion:0

Trust: 0.3

vendor:debianmodel:linux ia-32scope:eqversion:3.1

Trust: 0.3

vendor:ciscomodel:gss global site selectorscope:eqversion:44920

Trust: 0.3

vendor:redhatmodel:network satellite (for rhelscope:eqversion:4)4.2

Trust: 0.3

vendor:s u s emodel:suse linux openexchange serverscope:eqversion:4.0

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:7.50

Trust: 0.3

vendor:freebsdmodel:-prereleasescope:eqversion:4.9

Trust: 0.3

vendor:sunmodel:jrescope:eqversion:1.3.0

Trust: 0.3

vendor:s u s emodel:linux professional x86 64scope:eqversion:9.0

Trust: 0.3

vendor:turbolinuxmodel:multimediascope: - version: -

Trust: 0.3

vendor:ciscomodel:ons optical transport platformscope:eqversion:154544.0(2)

Trust: 0.3

vendor:freebsdmodel:-stablescope:eqversion:4.1.1

Trust: 0.3

vendor:ciscomodel:wide area file servicesscope:eqversion:0

Trust: 0.3

vendor:s u s emodel:linux desktopscope:eqversion:1.0

Trust: 0.3

vendor:ciscomodel:call manager sr2cscope:eqversion:4.0

Trust: 0.3

vendor:sunmodel:java web proxy server sp2scope:eqversion:3.6

Trust: 0.3

vendor:freebsdmodel:alphascope:eqversion:5.0

Trust: 0.3

vendor:attachmatemodel:reflectionscope:neversion:13.0.5

Trust: 0.3

vendor:beamodel:systems weblogic expressscope:eqversion:8.1

Trust: 0.3

vendor:beamodel:systems weblogic server spscope:eqversion:8.11

Trust: 0.3

vendor:ciscomodel:secure acs for unixscope:eqversion:2.0

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:4.5

Trust: 0.3

vendor:turbolinuxmodel:fujiscope: - version: -

Trust: 0.3

vendor:opensslmodel:project openssl bscope:eqversion:0.9.7

Trust: 0.3

vendor:beamodel:systems weblogic server for win32 spscope:eqversion:8.11

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:neversion:1.0.6

Trust: 0.3

vendor:sybasemodel:asescope:eqversion:12.5.2

Trust: 0.3

vendor:sybasemodel:unwired orchestratorscope:eqversion:5.0

Trust: 0.3

vendor:beamodel:systems weblogic express for win32scope:eqversion:7.0

Trust: 0.3

vendor:sybasemodel:afariascope:eqversion:5.4

Trust: 0.3

vendor:sunmodel:jsse 03scope:eqversion:1.0.3

Trust: 0.3

vendor:oraclemodel:http serverscope:eqversion:9.2.0

Trust: 0.3

vendor:ubuntumodel:linux lts amd64scope:eqversion:6.06

Trust: 0.3

vendor:sunmodel:one web server sp1scope:eqversion:6.0

Trust: 0.3

vendor:openpkgmodel:e1.0-solidscope: - version: -

Trust: 0.3

vendor:sunmodel:jre 003scope:eqversion:1.2.1

Trust: 0.3

vendor:s u s emodel:suse linux retail solutionscope:eqversion:8.0

Trust: 0.3

vendor:beamodel:systems weblogic expressscope:eqversion:9.2

Trust: 0.3

vendor:vmwaremodel:serverscope:neversion:1.0.5

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:5.1

Trust: 0.3

vendor:ingatemodel:firewallscope:neversion:4.5.1

Trust: 0.3

vendor:ciscomodel:ons 15454sdhscope:eqversion:4.1(2)

Trust: 0.3

vendor:sybasemodel:afariascope:eqversion:5.2

Trust: 0.3

vendor:beamodel:systems weblogic serverscope:eqversion:8.1

Trust: 0.3

vendor:s u s emodel:suse linux standard serverscope:eqversion:8.0

Trust: 0.3

vendor:ibmmodel:hardware management console for pseries r5.0scope:eqversion:4.0

Trust: 0.3

vendor:s u s emodel:linux professionalscope:eqversion:10.1

Trust: 0.3

vendor:netscapemodel:netscapescope:eqversion:7.2

Trust: 0.3

vendor:freebsdmodel:-release/alphascope:eqversion:5.1

Trust: 0.3

vendor:sybasemodel:ffi bptwscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:ons 15454sdhscope:eqversion:4.1(3)

Trust: 0.3

vendor:ciscomodel:security agentscope:eqversion:2.1

Trust: 0.3

vendor:s u s emodel:linux professionalscope:eqversion:9.3

Trust: 0.3

vendor:sunmodel:java web proxy server sp6scope:eqversion:3.6

Trust: 0.3

vendor:s u s emodel:linux personalscope:eqversion:9.0

Trust: 0.3

vendor:openpkgmodel:openpkgscope:eqversion:2.5

Trust: 0.3

vendor:ciscomodel:ciscoworks common management foundationscope:eqversion:2.0

Trust: 0.3

vendor:vmwaremodel:playerscope:eqversion:1.0.4

Trust: 0.3

vendor:sunmodel:java system application server 2004q2 r2 standardscope:eqversion:7.0

Trust: 0.3

vendor:sshmodel:communications security ssh tectia jscope:eqversion:4.3.2

Trust: 0.3

vendor:ciscomodel:call manager 4.1 sr4scope: - version: -

Trust: 0.3

vendor:hpmodel:openvms secure web serverscope:eqversion:2.1-1

Trust: 0.3

vendor:hpmodel:virtualvault a.04.60scope: - version: -

Trust: 0.3

vendor:s u s emodel:open-enterprise-serverscope:eqversion:0

Trust: 0.3

vendor:sybasemodel:afariascope:eqversion:5.3

Trust: 0.3

vendor:openofficemodel:openofficescope:eqversion:2.0.3

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:3.2.1

Trust: 0.3

vendor:freebsdmodel:-release-p14scope:eqversion:5.0

Trust: 0.3

vendor:attachmatemodel:reflectionscope:eqversion:10.0

Trust: 0.3

vendor:sunmodel:java enterprise system 2005q4scope: - version: -

Trust: 0.3

vendor:beamodel:systems weblogic expressscope:eqversion:9.0

Trust: 0.3

vendor:redmodel:hat fedora core5scope: - version: -

Trust: 0.3

vendor:beamodel:systems weblogic server spscope:eqversion:7.02

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:4.6

Trust: 0.3

vendor:oraclemodel:http serverscope:eqversion:1.0.2.0

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.0.1

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:4.4

Trust: 0.3

vendor:ipcopmodel:ipcopscope:eqversion:1.4.10

Trust: 0.3

vendor:beamodel:systems weblogic serverscope:eqversion:9.2

Trust: 0.3

vendor:ciscomodel:secure acs for windows ntscope:eqversion:3.0.3

Trust: 0.3

vendor:ingatemodel:firewalllscope:eqversion:4.4

Trust: 0.3

vendor:sunmodel:one web proxy serverscope:eqversion:3.6

Trust: 0.3

vendor:sunmodel:sdk 01ascope:eqversion:1.3.1

Trust: 0.3

vendor:beamodel:systems weblogic express spscope:eqversion:8.15

Trust: 0.3

vendor:hpmodel:system management homepagescope:neversion:2.1.7

Trust: 0.3

vendor:openofficemodel:betascope:eqversion:2.0

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:5.04

Trust: 0.3

vendor:sunmodel:solaris 9 x86 updatescope:eqversion:5

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:5.5

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:4.0.x

Trust: 0.3

vendor:sshmodel:communications security ssh tectia managerscope:eqversion:1.2

Trust: 0.3

vendor:ciscomodel:ons optical transport platformscope:eqversion:154543.4

Trust: 0.3

vendor:vmwaremodel:acescope:neversion:1.0.5

Trust: 0.3

vendor:mozillamodel:network security servicesscope:neversion:3.11.3

Trust: 0.3

vendor:beamodel:systems weblogic express spscope:eqversion:8.14

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.11

Trust: 0.3

vendor:openbsdmodel:openbsdscope:eqversion:3.8

Trust: 0.3

vendor:ciscomodel:ons ios-based bladesscope:eqversion:15454

Trust: 0.3

vendor:sunmodel:jre 004scope:eqversion:1.2.2

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:7.23

Trust: 0.3

vendor:beamodel:systems weblogic server spscope:eqversion:7.07

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:4.2.3

Trust: 0.3

vendor:sybasemodel:rfid enterprisescope:eqversion:2.1

Trust: 0.3

vendor:freebsdmodel:-stablescope:eqversion:4.11

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:6.0

Trust: 0.3

vendor:opensslmodel:project openssl dscope:eqversion:0.9.7

Trust: 0.3

vendor:vmwaremodel:playerscope:eqversion:2.0

Trust: 0.3

vendor:beamodel:systems weblogic server for win32 spscope:eqversion:7.07

Trust: 0.3

vendor:beamodel:systems weblogic express for win32 spscope:eqversion:7.0.0.12

Trust: 0.3

vendor:navisionmodel:financials serverscope:eqversion:3.0

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:8.1

Trust: 0.3

vendor:themodel:legion of the bouncy castle java cryptography apiscope:eqversion:1.37

Trust: 0.3

vendor:vmwaremodel:playerscope:eqversion:2.0.2

Trust: 0.3

vendor:freebsdmodel:-stablepre2002-03-07scope:eqversion:4.5

Trust: 0.3

vendor:ciscomodel:unified presence serverscope:eqversion:1.0(2)

Trust: 0.3

vendor:sshmodel:communications security ssh tectia serverscope:eqversion:4.0

Trust: 0.3

vendor:sshmodel:communications security ssh tectia server for ibm z/osscope:eqversion:5.2

Trust: 0.3

vendor:sshmodel:communications security ssh tectia connectorscope:eqversion:5.1

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:neversion:1.5.0.8

Trust: 0.3

vendor:sybasemodel:ffi cons bankingscope:eqversion:0

Trust: 0.3

vendor:freebsdmodel:alphascope:eqversion:4.0

Trust: 0.3

vendor:opensslmodel:project openssl ascope:eqversion:0.9.6

Trust: 0.3

vendor:ciscomodel:call managerscope:eqversion:4.2(3)

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.9

Trust: 0.3

vendor:sunmodel:java enterprise system 2004q2scope: - version: -

Trust: 0.3

vendor:van dykemodel:securefxscope:eqversion:4.0.2

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.1.1

Trust: 0.3

vendor:sunmodel:java system web server sp7scope:eqversion:6.0

Trust: 0.3

vendor:opensslmodel:project openssl fscope:eqversion:0.9.7

Trust: 0.3

vendor:ciscomodel:ciscoworks common management foundationscope:eqversion:2.2

Trust: 0.3

vendor:beamodel:systems weblogic express spscope:eqversion:7.01

Trust: 0.3

vendor:vmwaremodel:serverscope:eqversion:1.0.2

Trust: 0.3

vendor:susemodel:linux enterprise serverscope:eqversion:9

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.5.0.5

Trust: 0.3

vendor:hpmodel:hp-ux b.11.11scope: - version: -

Trust: 0.3

vendor:operamodel:software opera web browser 3win32scope:eqversion:7.0

Trust: 0.3

vendor:vmwaremodel:esx serverscope:eqversion:2.5.4

Trust: 0.3

vendor:sunmodel:java web proxy server sp1scope:eqversion:4.0

Trust: 0.3

vendor:beamodel:systems weblogic express spscope:eqversion:7.06

Trust: 0.3

vendor:ciscomodel:call manager es40scope:eqversion:4.0

Trust: 0.3

vendor:s u s emodel:novell linux desktopscope:eqversion:9.0

Trust: 0.3

vendor:sunmodel:jre 09scope:eqversion:1.1.6

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:4.3

Trust: 0.3

vendor:netbsdmodel:netbsdscope:eqversion:2.0.3

Trust: 0.3

vendor:ciscomodel:security agentscope:eqversion:5.0

Trust: 0.3

vendor:operamodel:software opera web browser 2win32scope:eqversion:7.0

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:8.01

Trust: 0.3

vendor:ciscomodel:secure acs for windows serverscope:eqversion:3.2

Trust: 0.3

vendor:freebsdmodel:-stablepre050201scope:eqversion:4.2

Trust: 0.3

vendor:ciscomodel:idsscope:eqversion:0

Trust: 0.3

vendor:sybasemodel:appeonscope:eqversion:2.8

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.5.0.7

Trust: 0.3

vendor:operamodel:software opera web browser win32scope:eqversion:6.0.4

Trust: 0.3

vendor:debianmodel:linux armscope:eqversion:3.1

Trust: 0.3

vendor:vmwaremodel:workstationscope:eqversion:6.0.2

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:4.4

Trust: 0.3

vendor:sybasemodel:bpi for healthcarescope:eqversion:2.2.1

Trust: 0.3

vendor:sunmodel:java web proxy server sp5scope:eqversion:3.6

Trust: 0.3

vendor:sunmodel:sdk .0 05scope:eqversion:1.3

Trust: 0.3

vendor:sunmodel:jre 003scope:eqversion:1.1.8

Trust: 0.3

vendor:turbolinuxmodel:serverscope:eqversion:10.0x86

Trust: 0.3

vendor:ciscomodel:ons 15454sdhscope:eqversion:4.0

Trust: 0.3

vendor:iscmodel:bind -p1scope:eqversion:9.3.2

Trust: 0.3

vendor:ciscomodel:ons 15454sdhscope:eqversion:3.2

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:9.0

Trust: 0.3

vendor:ciscomodel:series airespace wireless lan controllerscope:eqversion:40003.1.59.24

Trust: 0.3

vendor:sunmodel:sdkscope:eqversion:1.3

Trust: 0.3

vendor:ibmmodel:hardware management console for iseries r1.0scope:eqversion:5.0

Trust: 0.3

vendor:ciscomodel:ons optical transport platformscope:eqversion:154544.5

Trust: 0.3

vendor:s u s emodel:open-enterprise-serverscope:eqversion:9.0

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:7.20

Trust: 0.3

vendor:s u s emodel:unitedlinuxscope:eqversion:1.0

Trust: 0.3

vendor:sshmodel:communications security ssh tectia serverscope:neversion:5.1.1

Trust: 0.3

vendor:sunmodel:java system web server sp1scope:eqversion:6.0

Trust: 0.3

vendor:ciscomodel:series airespace wireless lan controllerscope:eqversion:20003.1.59.24

Trust: 0.3

vendor:s u s emodel:linux personal x86 64scope:eqversion:9.3

Trust: 0.3

vendor:s u s emodel:linux personalscope:eqversion:10.1

Trust: 0.3

vendor:beamodel:systems weblogic express spscope:eqversion:7.0.0.14

Trust: 0.3

vendor:sunmodel:sdk .0 01scope:eqversion:1.4

Trust: 0.3

vendor:turbolinuxmodel:appliance serverscope:eqversion:2.0

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:5.12

Trust: 0.3

vendor:ciscomodel:security agentscope:eqversion:5.0.193

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:6.10

Trust: 0.3

vendor:ciscomodel:call manager sr1scope:eqversion:4.1

Trust: 0.3

vendor:ciscomodel:gss global site selectorscope:eqversion:4480

Trust: 0.3

vendor:s u s emodel:linux professionalscope:eqversion:10.0

Trust: 0.3

vendor:beamodel:systems weblogic express for win32 spscope:eqversion:8.15

Trust: 0.3

vendor:beamodel:systems weblogic server for win32scope:eqversion:9.0

Trust: 0.3

vendor:ciscomodel:secure acs for windows ntscope:eqversion:2.6.4

Trust: 0.3

vendor:sybasemodel:iqscope:eqversion:12.7

Trust: 0.3

vendor:s u s emodel:linux professionalscope:eqversion:8.2

Trust: 0.3

vendor:oraclemodel:http serverscope:eqversion:1.0.2.2

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:5.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.10

Trust: 0.3

vendor:vmwaremodel:acescope:eqversion:1.0

Trust: 0.3

vendor:avayamodel:s8300 r2.0.0scope: - version: -

Trust: 0.3

vendor:beamodel:systems weblogic express for win32 spscope:eqversion:8.14

Trust: 0.3

vendor:oraclemodel:http serverscope:eqversion:9.0.3.1

Trust: 0.3

vendor:sshmodel:communications security ssh tectia serverscope:eqversion:4.3

Trust: 0.3

vendor:sunmodel:jre .0 03scope:eqversion:1.3

Trust: 0.3

vendor:opensslmodel:project opensslscope:eqversion:0.9.5

Trust: 0.3

vendor:openofficemodel:openofficescope:eqversion:2.3.1

Trust: 0.3

vendor:ciscomodel:secure acs for windows ntscope:eqversion:3.0

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:5.3

Trust: 0.3

vendor:sybasemodel:mfolioscope:eqversion:2.0

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:3.3.1

Trust: 0.3

vendor:sshmodel:communications security ssh tectia server for ibm z/osscope:neversion:5.2.1

Trust: 0.3

vendor:redhatmodel:enterprise linux ws ia64scope:eqversion:2.1

Trust: 0.3

vendor:avayamodel:s8710 r2.0.0scope: - version: -

Trust: 0.3

vendor:operamodel:software opera web browser win32scope:eqversion:5.11

Trust: 0.3

vendor:openpkgmodel:openpkgscope:eqversion:2.3

Trust: 0.3

vendor:iscmodel:bind rc1scope:eqversion:9.3.3

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:4.3

Trust: 0.3

vendor:sunmodel:solaris 9 sparcscope: - version: -

Trust: 0.3

vendor:iscmodel:bind b1scope:eqversion:9.4

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:3.2

Trust: 0.3

vendor:sunmodel:jdk 003scope:eqversion:1.1.8

Trust: 0.3

vendor:ciscomodel:ons 15454sdhscope:eqversion:3.3

Trust: 0.3

vendor:sshmodel:communications security ssh tectiascope:eqversion:1.3

Trust: 0.3

vendor:vmwaremodel:playerscope:eqversion:1.0.2

Trust: 0.3

vendor:ciscomodel:sip proxy serverscope: - version: -

Trust: 0.3

vendor:ciscomodel:secure acs for unixscope:eqversion:2.3.6.1

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.2.3

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:6.0

Trust: 0.3

vendor:iscmodel:bind b2scope:eqversion:9.4

Trust: 0.3

vendor:operamodel:software opera web browser win32 betascope:eqversion:7.02

Trust: 0.3

vendor:freebsdmodel:-stablescope:eqversion:4.5

Trust: 0.3

vendor:ciscomodel:secure acs solution enginescope:eqversion:3.3.2

Trust: 0.3

vendor:beamodel:systems weblogic expressscope:eqversion:9.1

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:5.10

Trust: 0.3

vendor:openofficemodel:openofficescope:eqversion:2.1

Trust: 0.3

vendor:sybasemodel:iqscope:eqversion:12.6

Trust: 0.3

vendor:mozillamodel:firefoxscope:neversion:1.5.8

Trust: 0.3

vendor:debianmodel:linux m68kscope:eqversion:3.1

Trust: 0.3

vendor:ciscomodel:ons 15454sdhscope:eqversion:4.0(2)

Trust: 0.3

vendor:avayamodel:messaging storage server mm3.0scope: - version: -

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:4.7

Trust: 0.3

vendor:redhatmodel:enterprise linux wsscope:eqversion:3

Trust: 0.3

vendor:avayamodel:s8500 cmscope:eqversion:3.1

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.11

Trust: 0.3

vendor:redmodel:hat enterprise linux as ia64scope:eqversion:2.1

Trust: 0.3

vendor:openvpnmodel:openvpnscope:eqversion:2.0.7

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:5.4

Trust: 0.3

vendor:ciscomodel:ons msppscope:eqversion:154540

Trust: 0.3

vendor:sunmodel:jssescope:eqversion:1.0.3

Trust: 0.3

vendor:netbsdmodel:current pre20010805scope: - version: -

Trust: 0.3

vendor:operamodel:software opera web browser win32scope:eqversion:6.0.2

Trust: 0.3

vendor:sunmodel:java web proxy serverscope:eqversion:4.0

Trust: 0.3

vendor:debianmodel:linuxscope:eqversion:3.1

Trust: 0.3

vendor:operamodel:software opera web browser linuxscope:eqversion:5.0

Trust: 0.3

vendor:ciscomodel:call manager es55scope:eqversion:4.1

Trust: 0.3

vendor:sybasemodel:eii avaki sdfscope:eqversion:5.1

Trust: 0.3

vendor:vmwaremodel:player buildscope:neversion:2.0.380004

Trust: 0.3

vendor:themodel:legion of the bouncy castle java cryptography apiscope:neversion:1.38

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:5.2

Trust: 0.3

vendor:debianmodel:linux alphascope:eqversion:3.1

Trust: 0.3

vendor:ciscomodel:security agentscope:eqversion:4.5.1.657

Trust: 0.3

vendor:operamodel:software opera web browser linuxscope:eqversion:6.0.2

Trust: 0.3

vendor:beamodel:systems weblogic serverscope:eqversion:9.1

Trust: 0.3

vendor:sunmodel:java system web server sp1scope:eqversion:6.1

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:4.2.1

Trust: 0.3

vendor:sunmodel:java web proxy server sp1scope:eqversion:3.6

Trust: 0.3

vendor:sunmodel:solaris updatescope:eqversion:95

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.1.3

Trust: 0.3

vendor:sybasemodel:solonde etlscope:eqversion:4.0

Trust: 0.3

vendor:sunmodel:jdkscope:eqversion:1.2.1

Trust: 0.3

vendor:mandrivamodel:linux mandrake x86 64scope:eqversion:2006.0

Trust: 0.3

vendor:opensslmodel:project openssl beta1scope:eqversion:0.9.7

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:5.3

Trust: 0.3

vendor:sybasemodel:iqscope:eqversion:12.5

Trust: 0.3

vendor:freebsdmodel:-stablescope:eqversion:4.6

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.0.2

Trust: 0.3

vendor:avayamodel:aura sip enablement servicesscope:eqversion:3.0

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.3

Trust: 0.3

vendor:avayamodel:s8700 r2.0.1scope: - version: -

Trust: 0.3

vendor:van dykemodel:vshellscope:eqversion:3.0

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.1.3

Trust: 0.3

vendor:hpmodel:system management homepagescope:neversion:2.1.8

Trust: 0.3

vendor:ciscomodel:application control engine modulescope:eqversion:0

Trust: 0.3

vendor:sunmodel:solaris 9 x86scope: - version: -

Trust: 0.3

vendor:opensslmodel:project openssl mscope:eqversion:0.9.6

Trust: 0.3

vendor:s u s emodel:linux professionalscope:eqversion:9.2

Trust: 0.3

vendor:beamodel:systems weblogic express spscope:eqversion:8.13

Trust: 0.3

vendor:opensslmodel:project openssl bscope:eqversion:0.9.2

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:4.3

Trust: 0.3

vendor:avayamodel:interactive responsescope:eqversion:2.0

Trust: 0.3

vendor:sybasemodel:easerverscope:eqversion:5.1

Trust: 0.3

vendor:sunmodel:java system web serverscope:eqversion:6.0

Trust: 0.3

vendor:opensslmodel:project openssl jscope:eqversion:0.9.6

Trust: 0.3

vendor:sshmodel:communications security ssh tectia serverscope:eqversion:4.4.3

Trust: 0.3

sources: CERT/CC: VU#386964 // CERT/CC: VU#845620 // CERT/CC: VU#594904 // CERT/CC: VU#547300 // BID: 19849 // JVNDB: JVNDB-2012-000079 // JVNDB: JVNDB-2007-000772 // NVD: CVE-2006-4339

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2006-4339
value: MEDIUM

Trust: 1.0

CARNEGIE MELLON: VU#386964
value: 0.32

Trust: 0.8

CARNEGIE MELLON: VU#845620
value: 7.56

Trust: 0.8

CARNEGIE MELLON: VU#594904
value: 0.63

Trust: 0.8

CARNEGIE MELLON: VU#547300
value: 2.53

Trust: 0.8

IPA: JVNDB-2012-000079
value: MEDIUM

Trust: 0.8

IPA: JVNDB-2007-000772
value: MEDIUM

Trust: 0.8

nvd@nist.gov: CVE-2006-4339
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

IPA: JVNDB-2012-000079
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

IPA: JVNDB-2007-000772
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

sources: CERT/CC: VU#386964 // CERT/CC: VU#845620 // CERT/CC: VU#594904 // CERT/CC: VU#547300 // JVNDB: JVNDB-2012-000079 // JVNDB: JVNDB-2007-000772 // NVD: CVE-2006-4339

PROBLEMTYPE DATA

problemtype:CWE-310

Trust: 1.0

problemtype:CWE-255

Trust: 0.8

problemtype:CWE-20

Trust: 0.8

sources: JVNDB: JVNDB-2012-000079 // JVNDB: JVNDB-2007-000772 // NVD: CVE-2006-4339

THREAT TYPE

network

Trust: 0.3

sources: BID: 19849

TYPE

Design Error

Trust: 0.3

sources: BID: 19849

CONFIGURATIONS

sources: JVNDB: JVNDB-2012-000079

PATCH

title:Adobe Readerurl:http://get.adobe.com/reader/

Trust: 0.8

title:HS07-034url:http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS07-034/index.html

Trust: 0.8

title:HS07-034url:http://www.hitachi-support.com/security_e/vuls_e/HS07-034_e/index-e.html

Trust: 0.8

sources: JVNDB: JVNDB-2012-000079 // JVNDB: JVNDB-2007-000772

EXTERNAL IDS

db:NVDid:CVE-2006-4339

Trust: 3.8

db:BIDid:22083

Trust: 3.4

db:CERT/CCid:VU#845620

Trust: 2.9

db:SECUNIAid:21709

Trust: 1.8

db:SECUNIAid:22259

Trust: 1.8

db:SECUNIAid:22260

Trust: 1.8

db:SECUNIAid:22284

Trust: 1.8

db:JVNid:JVN51615542

Trust: 1.8

db:JVNDBid:JVNDB-2012-000079

Trust: 1.8

db:SECUNIAid:23280

Trust: 1.6

db:SECUNIAid:23309

Trust: 1.6

db:BIDid:19849

Trust: 1.3

db:SECUNIAid:38567

Trust: 1.2

db:SECUNIAid:38568

Trust: 1.2

db:CERT/CCid:VU#594904

Trust: 1.1

db:VUPENid:ADV-2007-0343

Trust: 1.0

db:VUPENid:ADV-2007-2163

Trust: 1.0

db:VUPENid:ADV-2006-4366

Trust: 1.0

db:VUPENid:ADV-2006-4750

Trust: 1.0

db:VUPENid:ADV-2008-0905

Trust: 1.0

db:VUPENid:ADV-2006-4216

Trust: 1.0

db:VUPENid:ADV-2007-4224

Trust: 1.0

db:VUPENid:ADV-2006-3936

Trust: 1.0

db:VUPENid:ADV-2006-4329

Trust: 1.0

db:VUPENid:ADV-2006-4417

Trust: 1.0

db:VUPENid:ADV-2006-4206

Trust: 1.0

db:VUPENid:ADV-2007-2783

Trust: 1.0

db:VUPENid:ADV-2006-3748

Trust: 1.0

db:VUPENid:ADV-2006-5146

Trust: 1.0

db:VUPENid:ADV-2006-3899

Trust: 1.0

db:VUPENid:ADV-2006-4207

Trust: 1.0

db:VUPENid:ADV-2006-3730

Trust: 1.0

db:VUPENid:ADV-2006-4744

Trust: 1.0

db:VUPENid:ADV-2007-1401

Trust: 1.0

db:VUPENid:ADV-2006-3793

Trust: 1.0

db:VUPENid:ADV-2006-3453

Trust: 1.0

db:VUPENid:ADV-2007-1945

Trust: 1.0

db:VUPENid:ADV-2006-4205

Trust: 1.0

db:VUPENid:ADV-2007-2315

Trust: 1.0

db:VUPENid:ADV-2007-1815

Trust: 1.0

db:VUPENid:ADV-2007-0254

Trust: 1.0

db:VUPENid:ADV-2006-3566

Trust: 1.0

db:VUPENid:ADV-2006-4586

Trust: 1.0

db:VUPENid:ADV-2010-0366

Trust: 1.0

db:VUPENid:ADV-2006-4327

Trust: 1.0

db:SECUNIAid:21852

Trust: 1.0

db:SECUNIAid:25284

Trust: 1.0

db:SECUNIAid:21767

Trust: 1.0

db:SECUNIAid:23155

Trust: 1.0

db:SECUNIAid:22066

Trust: 1.0

db:SECUNIAid:24099

Trust: 1.0

db:SECUNIAid:22446

Trust: 1.0

db:SECUNIAid:22585

Trust: 1.0

db:SECUNIAid:21906

Trust: 1.0

db:SECUNIAid:22799

Trust: 1.0

db:SECUNIAid:23915

Trust: 1.0

db:SECUNIAid:31492

Trust: 1.0

db:SECUNIAid:21873

Trust: 1.0

db:SECUNIAid:22758

Trust: 1.0

db:SECUNIAid:22936

Trust: 1.0

db:SECUNIAid:26329

Trust: 1.0

db:SECUNIAid:23455

Trust: 1.0

db:SECUNIAid:22689

Trust: 1.0

db:SECUNIAid:22232

Trust: 1.0

db:SECUNIAid:21927

Trust: 1.0

db:SECUNIAid:21870

Trust: 1.0

db:SECUNIAid:21823

Trust: 1.0

db:SECUNIAid:24930

Trust: 1.0

db:SECUNIAid:22932

Trust: 1.0

db:SECUNIAid:22934

Trust: 1.0

db:SECUNIAid:22938

Trust: 1.0

db:SECUNIAid:23841

Trust: 1.0

db:SECUNIAid:21776

Trust: 1.0

db:SECUNIAid:22671

Trust: 1.0

db:SECUNIAid:22733

Trust: 1.0

db:SECUNIAid:22949

Trust: 1.0

db:SECUNIAid:21791

Trust: 1.0

db:SECUNIAid:22044

Trust: 1.0

db:SECUNIAid:22545

Trust: 1.0

db:SECUNIAid:28115

Trust: 1.0

db:SECUNIAid:22036

Trust: 1.0

db:SECUNIAid:24950

Trust: 1.0

db:SECUNIAid:22226

Trust: 1.0

db:SECUNIAid:22948

Trust: 1.0

db:SECUNIAid:21778

Trust: 1.0

db:SECUNIAid:25649

Trust: 1.0

db:SECUNIAid:21785

Trust: 1.0

db:SECUNIAid:22325

Trust: 1.0

db:SECUNIAid:23794

Trust: 1.0

db:SECUNIAid:22937

Trust: 1.0

db:SECUNIAid:22711

Trust: 1.0

db:SECUNIAid:21930

Trust: 1.0

db:SECUNIAid:21982

Trust: 1.0

db:SECUNIAid:22940

Trust: 1.0

db:SECUNIAid:22523

Trust: 1.0

db:SECUNIAid:26893

Trust: 1.0

db:SECUNIAid:41818

Trust: 1.0

db:SECUNIAid:21846

Trust: 1.0

db:SECUNIAid:22161

Trust: 1.0

db:SECUNIAid:22509

Trust: 1.0

db:SECUNIAid:25399

Trust: 1.0

db:SECUNIAid:60799

Trust: 1.0

db:SECUNIAid:21812

Trust: 1.0

db:SECUNIAid:23680

Trust: 1.0

db:SECUNIAid:22513

Trust: 1.0

db:SECUNIAid:22939

Trust: 1.0

db:SECTRACKid:1016791

Trust: 1.0

db:SECTRACKid:1017522

Trust: 1.0

db:BIDid:28276

Trust: 1.0

db:OSVDBid:28549

Trust: 1.0

db:USCERTid:TA06-333A

Trust: 1.0

db:BIDid:20246

Trust: 0.8

db:CERT/CCid:VU#386964

Trust: 0.8

db:SECTRACKid:1017143

Trust: 0.8

db:SECUNIAid:22646

Trust: 0.8

db:SECUNIAid:22207

Trust: 0.8

db:SECUNIAid:22212

Trust: 0.8

db:SECUNIAid:22116

Trust: 0.8

db:SECUNIAid:22216

Trust: 0.8

db:SECUNIAid:22220

Trust: 0.8

db:SECUNIAid:22330

Trust: 0.8

db:SECUNIAid:22130

Trust: 0.8

db:SECUNIAid:22240

Trust: 0.8

db:SECUNIAid:22165

Trust: 0.8

db:SECUNIAid:22166

Trust: 0.8

db:SECUNIAid:22172

Trust: 0.8

db:SECUNIAid:22186

Trust: 0.8

db:SECUNIAid:22193

Trust: 0.8

db:SECUNIAid:22094

Trust: 0.8

db:BIDid:20249

Trust: 0.8

db:SECTRACKid:1016943

Trust: 0.8

db:XFid:29237

Trust: 0.8

db:CERT/CCid:VU#547300

Trust: 0.8

db:SECUNIAid:27421

Trust: 0.8

db:XFid:28755

Trust: 0.8

db:JVNDBid:JVNDB-2007-000772

Trust: 0.8

db:PACKETSTORMid:49782

Trust: 0.1

db:PACKETSTORMid:128056

Trust: 0.1

db:PACKETSTORMid:53990

Trust: 0.1

db:PACKETSTORMid:86234

Trust: 0.1

db:PACKETSTORMid:49826

Trust: 0.1

db:PACKETSTORMid:58346

Trust: 0.1

db:PACKETSTORMid:51167

Trust: 0.1

db:PACKETSTORMid:49927

Trust: 0.1

db:PACKETSTORMid:86249

Trust: 0.1

sources: CERT/CC: VU#386964 // CERT/CC: VU#845620 // CERT/CC: VU#594904 // CERT/CC: VU#547300 // BID: 19849 // PACKETSTORM: 49782 // PACKETSTORM: 128056 // PACKETSTORM: 53990 // PACKETSTORM: 86234 // PACKETSTORM: 49826 // PACKETSTORM: 58346 // PACKETSTORM: 51167 // PACKETSTORM: 49927 // PACKETSTORM: 86249 // JVNDB: JVNDB-2012-000079 // JVNDB: JVNDB-2007-000772 // NVD: CVE-2006-4339

REFERENCES

url:http://www.securityfocus.com/bid/22083

Trust: 3.4

url:http://www.imc.org/ietf-openpgp/mail-archive/msg14307.html

Trust: 2.1

url:http://www.kb.cert.org/vuls/id/845620

Trust: 2.1

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-4339

Trust: 1.9

url:http://www.matasano.com/log/469/many-rsa-signatures-may-be-forgeable-in-openssl-and-elsewhere/

Trust: 1.8

url:http://jvn.jp/en/jp/jvn51615542/index.html

Trust: 1.8

url:http://www.openssl.org/news/secadv_20060928.txt

Trust: 1.6

url:http://secunia.com/advisories/23280/

Trust: 1.6

url:http://secunia.com/advisories/23309/

Trust: 1.6

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2006-4339

Trust: 1.6

url:http://www.openoffice.org/security/cves/cve-2006-4339.html

Trust: 1.5

url:http://www.openssl.org/news/secadv_20060905.txt

Trust: 1.4

url:http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&id=3117

Trust: 1.3

url:http://docs.info.apple.com/article.html?artnum=304829

Trust: 1.3

url:http://support.avaya.com/elmodocs2/security/asa-2006-188.htm

Trust: 1.3

url:http://www.cisco.com/warp/public/707/cisco-sr-20061108-openssl.shtml

Trust: 1.3

url:http://support.attachmate.com/techdocs/2137.html

Trust: 1.3

url:http://www.bluecoat.com/support/knowledge/openssl_rsa_signature_forgery.html

Trust: 1.3

url:http://www.vmware.com/support/server/doc/releasenotes_server.html

Trust: 1.3

url:http://docs.info.apple.com/article.html?artnum=307177

Trust: 1.3

url:https://secure-support.novell.com/kanisaplatform/publishing/41/3143224_f.sal_public.html

Trust: 1.3

url:http://sunsolve.sun.com/search/document.do?assetkey=1-66-200708-1

Trust: 1.3

url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-102759-1

Trust: 1.3

url:http://www.sybase.com/detail?id=1047991

Trust: 1.3

url:http://security.gentoo.org/glsa/glsa-200609-05.xml

Trust: 1.1

url:http://secunia.com/advisories/22939

Trust: 1.0

url:https://issues.rpath.com/browse/rpl-1633

Trust: 1.0

url:http://securitytracker.com/id?1016791

Trust: 1.0

url:http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html

Trust: 1.0

url:http://www.opera.com/support/search/supsearch.dml?index=845

Trust: 1.0

url:http://www.vupen.com/english/advisories/2006/3453

Trust: 1.0

url:http://www.osvdb.org/28549

Trust: 1.0

url:http://www.vupen.com/english/advisories/2007/0254

Trust: 1.0

url:http://itrc.hp.com/service/cki/docdisplay.do?docid=c00849540

Trust: 1.0

url:http://secunia.com/advisories/23841

Trust: 1.0

url:http://secunia.com/advisories/60799

Trust: 1.0

url:http://www.openpkg.com/security/advisories/openpkg-sa-2006.018.html

Trust: 1.0

url:http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?lang=en&cc=us&objectid=c01070495

Trust: 1.0

url:http://www.securityfocus.com/archive/1/450327/100/0/threaded

Trust: 1.0

url:http://secunia.com/advisories/22161

Trust: 1.0

url:http://secunia.com/advisories/23455

Trust: 1.0

url:http://www.vupen.com/english/advisories/2006/4206

Trust: 1.0

url:http://secunia.com/advisories/22585

Trust: 1.0

url:http://secunia.com/advisories/22044

Trust: 1.0

url:http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html

Trust: 1.0

url:http://secunia.com/advisories/21791

Trust: 1.0

url:http://secunia.com/advisories/22446

Trust: 1.0

url:http://support.attachmate.com/techdocs/2127.html

Trust: 1.0

url:http://secunia.com/advisories/21709

Trust: 1.0

url:http://www.us.debian.org/security/2006/dsa-1173

Trust: 1.0

url:http://lists.apple.com/archives/security-announce/2006/nov/msg00001.html

Trust: 1.0

url:http://openvpn.net/changelog.html

Trust: 1.0

url:http://lists.vmware.com/pipermail/security-announce/2008/000008.html

Trust: 1.0

url:http://www.vupen.com/english/advisories/2006/4417

Trust: 1.0

url:http://secunia.com/advisories/22758

Trust: 1.0

url:http://secunia.com/advisories/22284

Trust: 1.0

url:http://www.openbsd.org/errata.html

Trust: 1.0

url:http://www.securityfocus.com/archive/1/489739/100/0/threaded

Trust: 1.0

url:http://secunia.com/advisories/21870

Trust: 1.0

url:http://www.vupen.com/english/advisories/2006/4744

Trust: 1.0

url:http://www.vmware.com/support/ace2/doc/releasenotes_ace2.html

Trust: 1.0

url:http://secunia.com/advisories/22226

Trust: 1.0

url:http://www.vmware.com/support/player2/doc/releasenotes_player2.html

Trust: 1.0

url:http://secunia.com/advisories/23155

Trust: 1.0

url:https://www2.itrc.hp.com/service/cki/docdisplay.do?docid=c00967144

Trust: 1.0

url:http://secunia.com/advisories/21852

Trust: 1.0

url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-102744-1

Trust: 1.0

url:http://secunia.com/advisories/21906

Trust: 1.0

url:http://www.vupen.com/english/advisories/2010/0366

Trust: 1.0

url:http://secunia.com/advisories/21930

Trust: 1.0

url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-102722-1

Trust: 1.0

url:http://www.vupen.com/english/advisories/2006/3793

Trust: 1.0

url:http://secunia.com/advisories/22733

Trust: 1.0

url:http://www.novell.com/linux/security/advisories/2006_61_opera.html

Trust: 1.0

url:http://secunia.com/advisories/22066

Trust: 1.0

url:http://sunsolve.sun.com/search/document.do?assetkey=1-77-1000148.1-1

Trust: 1.0

url:http://www.redhat.com/support/errata/rhsa-2008-0629.html

Trust: 1.0

url:http://www.vupen.com/english/advisories/2006/3936

Trust: 1.0

url:http://secunia.com/advisories/22937

Trust: 1.0

url:http://secunia.com/advisories/26893

Trust: 1.0

url:http://www.vmware.com/support/vi3/doc/esx-3069097-patch.html

Trust: 1.0

url:ftp://patches.sgi.com/support/free/security/advisories/20060901-01-p.asc

Trust: 1.0

url:http://secunia.com/advisories/22938

Trust: 1.0

url:http://www.mandriva.com/security/advisories?name=mdksa-2006:207

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=130497311408250&w=2

Trust: 1.0

url:http://secunia.com/advisories/21812

Trust: 1.0

url:http://secunia.com/advisories/41818

Trust: 1.0

url:http://secunia.com/advisories/22545

Trust: 1.0

url:http://www.vupen.com/english/advisories/2007/1815

Trust: 1.0

url:http://www.securityfocus.com/bid/28276

Trust: 1.0

url:http://marc.info/?l=bind-announce&m=116253119512445&w=2

Trust: 1.0

url:http://www.vupen.com/english/advisories/2007/2783

Trust: 1.0

url:http://secunia.com/advisories/24099

Trust: 1.0

url:http://www.serv-u.com/releasenotes/

Trust: 1.0

url:http://secunia.com/advisories/21846

Trust: 1.0

url:http://www.novell.com/linux/security/advisories/2007_10_ibmjava.html

Trust: 1.0

url:http://www.gentoo.org/security/en/glsa/glsa-200610-06.xml

Trust: 1.0

url:http://secunia.com/advisories/31492

Trust: 1.0

url:http://www.vupen.com/english/advisories/2006/4327

Trust: 1.0

url:http://www.cisco.com/en/us/products/hw/contnetw/ps4162/tsd_products_security_response09186a008077af1b.html

Trust: 1.0

url:http://secunia.com/advisories/21776

Trust: 1.0

url:http://www.securityfocus.com/archive/1/445231/100/0/threaded

Trust: 1.0

url:http://lists.apple.com/archives/security-announce/2007/dec/msg00001.html

Trust: 1.0

url:http://www.vupen.com/english/advisories/2007/1401

Trust: 1.0

url:http://secunia.com/advisories/22523

Trust: 1.0

url:http://secunia.com/advisories/38567

Trust: 1.0

url:http://www.us-cert.gov/cas/techalerts/ta06-333a.html

Trust: 1.0

url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-102657-1

Trust: 1.0

url:http://dev2dev.bea.com/pub/advisory/238

Trust: 1.0

url:http://www.mandriva.com/security/advisories?name=mdksa-2006:161

Trust: 1.0

url:http://www.securityfocus.com/bid/19849

Trust: 1.0

url:http://secunia.com/advisories/28115

Trust: 1.0

url:http://www.vupen.com/english/advisories/2006/5146

Trust: 1.0

url:http://www.debian.org/security/2006/dsa-1174

Trust: 1.0

url:http://secunia.com/advisories/21823

Trust: 1.0

url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-102696-1

Trust: 1.0

url:http://secunia.com/advisories/22232

Trust: 1.0

url:http://secunia.com/advisories/21785

Trust: 1.0

url:http://secunia.com/advisories/22932

Trust: 1.0

url:http://secunia.com/advisories/22036

Trust: 1.0

url:http://secunia.com/advisories/22949

Trust: 1.0

url:http://www.vupen.com/english/advisories/2007/1945

Trust: 1.0

url:http://secunia.com/advisories/22513

Trust: 1.0

url:http://secunia.com/advisories/25284

Trust: 1.0

url:http://secunia.com/advisories/25399

Trust: 1.0

url:http://securitytracker.com/id?1017522

Trust: 1.0

url:http://www.vupen.com/english/advisories/2006/4207

Trust: 1.0

url:http://www.vupen.com/english/advisories/2006/4216

Trust: 1.0

url:https://issues.rpath.com/browse/rpl-616

Trust: 1.0

url:http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?objectid=c01118771

Trust: 1.0

url:http://www.vupen.com/english/advisories/2007/2163

Trust: 1.0

url:http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.605306

Trust: 1.0

url:http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.566955

Trust: 1.0

url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-102648-1

Trust: 1.0

url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-102686-1

Trust: 1.0

url:http://www.vmware.com/support/esx21/doc/esx-213-200612-patch.html

Trust: 1.0

url:http://www.mandriva.com/security/advisories?name=mdksa-2006:177

Trust: 1.0

url:http://www.vmware.com/support/esx2/doc/esx-202-200612-patch.html

Trust: 1.0

url:http://secunia.com/advisories/22259

Trust: 1.0

url:http://secunia.com/advisories/22260

Trust: 1.0

url:http://secunia.com/advisories/21873

Trust: 1.0

url:http://www.vupen.com/english/advisories/2007/4224

Trust: 1.0

url:http://www.vupen.com/english/advisories/2008/0905/references

Trust: 1.0

url:http://secunia.com/advisories/21927

Trust: 1.0

url:http://secunia.com/advisories/23680

Trust: 1.0

url:http://www1.itrc.hp.com/service/cki/docdisplay.do?docid=c00771742

Trust: 1.0

url:http://secunia.com/advisories/21982

Trust: 1.0

url:http://www.mandriva.com/security/advisories?name=mdksa-2006:178

Trust: 1.0

url:http://secunia.com/advisories/24930

Trust: 1.0

url:http://www.vupen.com/english/advisories/2007/0343

Trust: 1.0

url:http://secunia.com/advisories/21767

Trust: 1.0

url:http://secunia.com/advisories/22799

Trust: 1.0

url:http://www.oracle.com/technetwork/topics/security/cpujan2007-101493.html

Trust: 1.0

url:http://www.vupen.com/english/advisories/2006/3748

Trust: 1.0

url:http://sunsolve.sun.com/search/document.do?assetkey=1-66-201247-1

Trust: 1.0

url:http://secunia.com/advisories/23915

Trust: 1.0

url:http://www.vupen.com/english/advisories/2006/4586

Trust: 1.0

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/28755

Trust: 1.0

url:http://www.vupen.com/english/advisories/2006/3899

Trust: 1.0

url:http://secunia.com/advisories/21778

Trust: 1.0

url:http://secunia.com/advisories/22711

Trust: 1.0

url:http://secunia.com/advisories/22940

Trust: 1.0

url:http://secunia.com/advisories/22689

Trust: 1.0

url:http://www.vmware.com/support/vi3/doc/esx-9986131-patch.html

Trust: 1.0

url:http://secunia.com/advisories/38568

Trust: 1.0

url:http://www.novell.com/linux/security/advisories/2006_26_sr.html

Trust: 1.0

url:http://www.redhat.com/support/errata/rhsa-2007-0073.html

Trust: 1.0

url:http://www.vmware.com/support/player/doc/releasenotes_player.html

Trust: 1.0

url:http://www.novell.com/linux/security/advisories/2006_55_ssl.html

Trust: 1.0

url:http://secunia.com/advisories/22948

Trust: 1.0

url:http://secunia.com/advisories/22671

Trust: 1.0

url:http://www.redhat.com/support/errata/rhsa-2006-0661.html

Trust: 1.0

url:http://www.securityfocus.com/archive/1/445822/100/0/threaded

Trust: 1.0

url:http://secunia.com/advisories/25649

Trust: 1.0

url:http://www.vmware.com/security/advisories/vmsa-2008-0005.html

Trust: 1.0

url:http://www.vupen.com/english/advisories/2006/3566

Trust: 1.0

url:http://www.arkoon.fr/upload/alertes/40ak-2006-04-fr-1.1_ssl360_openssl_rsa.pdf

Trust: 1.0

url:http://secunia.com/advisories/22325

Trust: 1.0

url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-102656-1

Trust: 1.0

url:http://www.vupen.com/english/advisories/2006/4205

Trust: 1.0

url:http://www.vmware.com/support/esx25/doc/esx-254-200612-patch.html

Trust: 1.0

url:http://www.vupen.com/english/advisories/2006/4366

Trust: 1.0

url:http://secunia.com/advisories/24950

Trust: 1.0

url:http://security.freebsd.org/advisories/freebsd-sa-06:19.openssl.asc

Trust: 1.0

url:http://www.vupen.com/english/advisories/2007/2315

Trust: 1.0

url:http://www.securityfocus.com/archive/1/456546/100/200/threaded

Trust: 1.0

url:http://www.vupen.com/english/advisories/2006/4750

Trust: 1.0

url:http://www.redhat.com/support/errata/rhsa-2007-0072.html

Trust: 1.0

url:http://www.vmware.com/support/esx25/doc/esx-253-200612-patch.html

Trust: 1.0

url:http://www.openpkg.org/security/advisories/openpkg-sa-2006.029-bind.html

Trust: 1.0

url:http://jvndb.jvn.jp/ja/contents/2012/jvndb-2012-000079.html

Trust: 1.0

url:http://www.redhat.com/support/errata/rhsa-2007-0062.html

Trust: 1.0

url:http://www.vupen.com/english/advisories/2006/3730

Trust: 1.0

url:http://secunia.com/advisories/22509

Trust: 1.0

url:http://secunia.com/advisories/22934

Trust: 1.0

url:http://secunia.com/advisories/22936

Trust: 1.0

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a11656

Trust: 1.0

url:http://security.gentoo.org/glsa/glsa-200609-18.xml

Trust: 1.0

url:http://www.gentoo.org/security/en/glsa/glsa-201408-19.xml

Trust: 1.0

url:http://support.attachmate.com/techdocs/2128.html

Trust: 1.0

url:http://www.ubuntu.com/usn/usn-339-1

Trust: 1.0

url:http://www.vupen.com/english/advisories/2006/4329

Trust: 1.0

url:http://secunia.com/advisories/23794

Trust: 1.0

url:http://secunia.com/advisories/26329

Trust: 1.0

url:http://sunsolve.sun.com/search/document.do?assetkey=1-66-201534-1

Trust: 1.0

url:http://secunia.com/advisories/21709/

Trust: 0.9

url:http://jvn.jp/cert/jvnvu%23386964/index.html

Trust: 0.8

url:http://www.securityfocus.com/bid/20246

Trust: 0.8

url:http://www.openssl.org/news/secadv_20060905.txt

Trust: 0.8

url:http://www.rsasecurity.com/rsalabs/node.asp?id=2125

Trust: 0.8

url:http://www.ietf.org/rfc/rfc3447.txt

Trust: 0.8

url:http://www.sun.com/software/products/appsrvr/index.xml

Trust: 0.8

url:http://www.sun.com/download/products.xml?id=438cfb75

Trust: 0.8

url:http://www.sun.com/download/products.xml?id=43a84f89

Trust: 0.8

url:http://www.mozilla.org/projects/security/pki/nss/

Trust: 0.8

url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-102670-1

Trust: 0.8

url:http://en.wikipedia.org/wiki/ssl

Trust: 0.8

url:http://www.frsirt.com/english/advisories/2006/4299

Trust: 0.8

url:http://securitytracker.com/id?1017143

Trust: 0.8

url:http://secunia.com/advisories/22646

Trust: 0.8

url:http://jvn.jp/cert/jvnvu%23547300/index.html

Trust: 0.8

url:http://lists.grok.org.uk/pipermail/full-disclosure/2006-september/049715.html

Trust: 0.8

url:https://issues.rpath.com/browse/rpl-613

Trust: 0.8

url:http://www.openssl.org/news/secadv_20060928.txt

Trust: 0.8

url:http://kolab.org/security/kolab-vendor-notice-11.txt

Trust: 0.8

url:http://openvpn.net/changelog.html

Trust: 0.8

url:http://www.serv-u.com/releasenotes/

Trust: 0.8

url:http://openbsd.org/errata.html#openssl2

Trust: 0.8

url:http://www.securityfocus.com/bid/20249

Trust: 0.8

url:http://securitytracker.com/id?1016943

Trust: 0.8

url:http://secunia.com/advisories/22130

Trust: 0.8

url:http://secunia.com/advisories/22094

Trust: 0.8

url:http://secunia.com/advisories/22165

Trust: 0.8

url:http://secunia.com/advisories/22186

Trust: 0.8

url:http://secunia.com/advisories/22193

Trust: 0.8

url:http://secunia.com/advisories/22207

Trust: 0.8

url:http://secunia.com/advisories/22259

Trust: 0.8

url:http://secunia.com/advisories/22260

Trust: 0.8

url:http://secunia.com/advisories/22166

Trust: 0.8

url:http://secunia.com/advisories/22172

Trust: 0.8

url:http://secunia.com/advisories/22212

Trust: 0.8

url:http://secunia.com/advisories/22240

Trust: 0.8

url:http://secunia.com/advisories/22216

Trust: 0.8

url:http://secunia.com/advisories/22116

Trust: 0.8

url:http://secunia.com/advisories/22220

Trust: 0.8

url:http://secunia.com/advisories/22284

Trust: 0.8

url:http://secunia.com/advisories/22330

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/29237

Trust: 0.8

url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-102668-1

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-5810

Trust: 0.8

url:http://www.frsirt.com/english/advisories/2007/3666

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/28755

Trust: 0.8

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-5810

Trust: 0.8

url:http://secunia.com/advisories/27421

Trust: 0.8

url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-102656-1&searchclause=

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2006-4339

Trust: 0.5

url:http://freshmeat.net/projects/bouncycastlecryptoapi/releases/265580

Trust: 0.3

url:http://support.avaya.com/elmodocs2/security/asa-2006-196.htm

Trust: 0.3

url:http://support.avaya.com/elmodocs2/security/asa-2006-224.htm

Trust: 0.3

url:http://support.avaya.com/elmodocs2/security/asa-2006-246.htm

Trust: 0.3

url:http://www.isc.org/index.pl?/sw/bind/bind9.4-beta.php

Trust: 0.3

url:http://marc.theaimsgroup.com/?l=bind-announce&m=116253119512445&w=2

Trust: 0.3

url:http://www.bluecoat.com

Trust: 0.3

url:http://www.cisco.com/warp/public/707/cisco-air-20061108-openssl.shtml

Trust: 0.3

url:http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujan2007.html

Trust: 0.3

url:http://www.cdc.informatik.tu-darmstadt.de/securebrowser/

Trust: 0.3

url:http://www.ipcop.org/modules.php?op=modload&name=news&file=article&sid=31&mode=thread&order=0&thold=0

Trust: 0.3

url:http://www.mozilla.org/security/announce/2006/mfsa2006-60.html

Trust: 0.3

url:http://www.mozilla.org/security/announce/2006/mfsa2006-66.html

Trust: 0.3

url:ftp://ftp.netbsd.org/pub/netbsd/security/advisories/netbsd-sa2006-023.txt.asc

Trust: 0.3

url:http://www.ingate.com/relnote-451.php

Trust: 0.3

url:http://rhn.redhat.com/errata/rhsa-2006-0735.html

Trust: 0.3

url:http://rhn.redhat.com/errata/rhsa-2006-0661.html

Trust: 0.3

url:http://rhn.redhat.com/errata/rhsa-2006-0675.html

Trust: 0.3

url:http://rhn.redhat.com/errata/rhsa-2006-0676.html

Trust: 0.3

url:http://rhn.redhat.com/errata/rhsa-2006-0677.html

Trust: 0.3

url:http://rhn.redhat.com/errata/rhsa-2006-0733.html

Trust: 0.3

url:http://rhn.redhat.com/errata/rhsa-2006-0734.html

Trust: 0.3

url:http://www.ssh.com/company/news/2006/english/security/article/786/

Trust: 0.3

url:http://www.arkoon.fr/upload/alertes/44ak-2006-04-en-1.1_ssl360_openssl_rsa.pdf

Trust: 0.3

url:http://www1.vandyke.com/support/advisory/2007/01/845620.html

Trust: 0.3

url:http://www.slackware.com/security/list.php?l=slackware-security&y=2006

Trust: 0.3

url:http://www.cyberguard.info/snapgear/releases.html

Trust: 0.3

url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-102657-1&searchclause=

Trust: 0.3

url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-102696-1&searchclause=

Trust: 0.3

url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-102722-1&searchclause=

Trust: 0.3

url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-102744-1&searchclause=

Trust: 0.3

url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-102648-1&searchclause=

Trust: 0.3

url:/archive/1/446038

Trust: 0.3

url:http://support.avaya.com/elmodocs2/security/asa-2007-091.htm

Trust: 0.3

url:http://support.avaya.com/elmodocs2/security/asa-2006-250.htm

Trust: 0.3

url:https://www.itrc.hp.com/service/cki/docdisplay.do?docid=emr_na-c02475053

Trust: 0.3

url:http://www2.itrc.hp.com/service/cki/docdisplay.do?admit=-1335382922+1174502331230+28353475&docid=c00774579

Trust: 0.3

url:http://lists.grok.org.uk/pipermail/full-disclosure/2007-january/051708.html

Trust: 0.3

url:https://rhn.redhat.com/errata/rhsa-2007-0062.html

Trust: 0.3

url:http://rhn.redhat.com/errata/rhsa-2007-0072.html

Trust: 0.3

url:http://rhn.redhat.com/errata/rhsa-2008-0264.html

Trust: 0.3

url:http://rhn.redhat.com/errata/rhsa-2008-0525.html

Trust: 0.3

url:http://rhn.redhat.com/errata/rhsa-2008-0629.html

Trust: 0.3

url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-102759-1&searchclause=

Trust: 0.3

url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-102781-1&searchclause=

Trust: 0.3

url:http://www.kb.cert.org/vuls/id/594904

Trust: 0.3

url:http://creativecommons.org/licenses/by-sa/2.5

Trust: 0.3

url:http://security.gentoo.org/

Trust: 0.3

url:https://bugs.gentoo.org.

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2006-4343

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2006-2940

Trust: 0.2

url:http://www.itrc.hp.com/service/cki/secbullarchive.do

Trust: 0.2

url:http://h30046.www3.hp.com/driveralertprofile.php?regioncode=na&langcode=useng&jumpid=in_sc-gen__driveritrc&topiccode=itrc

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2006-2937

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2006-3738

Trust: 0.2

url:http://h30046.www3.hp.com/subsignin.php

Trust: 0.2

url:http://www.openoffice.org/security/cves/cve-2009-0217.html

Trust: 0.2

url:http://secunia.com/advisories/38568/

Trust: 0.2

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.2

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.2

url:http://secunia.com/blog/71/

Trust: 0.2

url:http://www.openoffice.org/security/cves/cve-2009-3301-3302.html

Trust: 0.2

url:http://www.openoffice.org/security/cves/cve-2009-2950.html

Trust: 0.2

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.2

url:http://www.openoffice.org/security/cves/cve-2009-2949.html

Trust: 0.2

url:http://www.mandriva.com/security/

Trust: 0.1

url:http://secunia.com/

Trust: 0.1

url:http://www.mandriva.com/security/advisories

Trust: 0.1

url:http://lists.grok.org.uk/full-disclosure-charter.html

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3302

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-0201

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-2950

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3451

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-4643

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-0201

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-0395

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-0247

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0247

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-2936

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-2949

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-2713

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-3450

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-3689

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-3301

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4253

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-0217

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4643

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-0200

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-1149

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3301

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2334

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3454

Trust: 0.1

url:http://security.gentoo.org/glsa/glsa-201408-19.xml

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-2334

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-2950

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-2665

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-3453

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1149

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3452

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0037

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-0037

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2149

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3453

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-2935

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3450

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-0395

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-3451

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-3302

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2936

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-3454

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2935

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-3452

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-0200

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-0217

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2006-4339

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2713

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-2149

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2665

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3689

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-2949

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-4253

Trust: 0.1

url:http://h20293.www2.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayproductinfo.pl?productnumber=hpuxwssuite

Trust: 0.1

url:http://software.hp.com/portal/swdepot/displayproductinfo.do?productnumber=b6834aa

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2005-2969

Trust: 0.1

url:http://secunia.com/advisories/38567/

Trust: 0.1

url:http://h18023.www1.hp.com/support/files/server/us/download/26977.html

Trust: 0.1

url:http://h18023.www1.hp.com/support/files/server/us/download/26866.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2006-3747

Trust: 0.1

url:http://h18023.www1.hp.com/support/files/server/us/download/26864.html

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-4340

Trust: 0.1

url:http://security.gentoo.org/glsa/glsa-200610-06.xml

Trust: 0.1

url:http://security.debian.org/pool/updates/main/o/openssl/openssl_0.9.7e-3sarge2.diff.gz

Trust: 0.1

url:http://security.debian.org/pool/updates/main/o/openssl/openssl_0.9.7e-3sarge2_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/o/openssl/libssl0.9.7_0.9.7e-3sarge2_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/o/openssl/openssl_0.9.7e.orig.tar.gz

Trust: 0.1

url:http://security.debian.org/pool/updates/main/o/openssl/libssl0.9.7_0.9.7e-3sarge2_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/o/openssl/libssl-dev_0.9.7e-3sarge2_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/o/openssl/libssl0.9.7_0.9.7e-3sarge2_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/o/openssl/openssl_0.9.7e-3sarge2_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/o/openssl/libssl-dev_0.9.7e-3sarge2_s390.deb

Trust: 0.1

url:http://www.debian.org/security/faq

Trust: 0.1

url:http://security.debian.org/pool/updates/main/o/openssl/openssl_0.9.7e-3sarge2_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/o/openssl/libssl-dev_0.9.7e-3sarge2_m68k.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/o/openssl/openssl_0.9.7e-3sarge2.dsc

Trust: 0.1

url:http://security.debian.org/pool/updates/main/o/openssl/libssl0.9.7_0.9.7e-3sarge2_m68k.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/o/openssl/openssl_0.9.7e-3sarge2_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/o/openssl/openssl_0.9.7e-3sarge2_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/o/openssl/libssl0.9.7_0.9.7e-3sarge2_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/o/openssl/libssl-dev_0.9.7e-3sarge2_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/o/openssl/libssl0.9.7_0.9.7e-3sarge2_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/o/openssl/libssl-dev_0.9.7e-3sarge2_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/o/openssl/openssl_0.9.7e-3sarge2_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/o/openssl/libssl0.9.7_0.9.7e-3sarge2_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/o/openssl/libssl-dev_0.9.7e-3sarge2_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/o/openssl/libssl0.9.7_0.9.7e-3sarge2_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/o/openssl/libssl0.9.7_0.9.7e-3sarge2_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/o/openssl/libssl-dev_0.9.7e-3sarge2_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/o/openssl/libssl-dev_0.9.7e-3sarge2_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/o/openssl/libssl-dev_0.9.7e-3sarge2_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/o/openssl/libssl0.9.7_0.9.7e-3sarge2_arm.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/o/openssl/openssl_0.9.7e-3sarge2_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/o/openssl/libssl-dev_0.9.7e-3sarge2_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/o/openssl/libssl0.9.7_0.9.7e-3sarge2_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/o/openssl/openssl_0.9.7e-3sarge2_arm.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/o/openssl/libssl0.9.7_0.9.7e-3sarge2_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/o/openssl/libssl-dev_0.9.7e-3sarge2_mips.deb

Trust: 0.1

url:http://packages.debian.org/<pkg>

Trust: 0.1

url:http://security.debian.org/pool/updates/main/o/openssl/openssl_0.9.7e-3sarge2_i386.deb

Trust: 0.1

url:http://security.debian.org/

Trust: 0.1

url:http://security.debian.org/pool/updates/main/o/openssl/openssl_0.9.7e-3sarge2_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/o/openssl/openssl_0.9.7e-3sarge2_m68k.deb

Trust: 0.1

url:http://www.debian.org/security/

Trust: 0.1

url:http://security.debian.org/pool/updates/main/o/openssl/openssl_0.9.7e-3sarge2_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/o/openssl/libssl-dev_0.9.7e-3sarge2_arm.deb

Trust: 0.1

url:http://www.openoffice.org/security/cves/cve-2009-2493.html

Trust: 0.1

url:http://secunia.com/advisories/35854/

Trust: 0.1

url:http://secunia.com/advisories/35967/

Trust: 0.1

sources: CERT/CC: VU#386964 // CERT/CC: VU#845620 // CERT/CC: VU#594904 // CERT/CC: VU#547300 // BID: 19849 // PACKETSTORM: 49782 // PACKETSTORM: 128056 // PACKETSTORM: 53990 // PACKETSTORM: 86234 // PACKETSTORM: 49826 // PACKETSTORM: 58346 // PACKETSTORM: 51167 // PACKETSTORM: 49927 // PACKETSTORM: 86249 // JVNDB: JVNDB-2012-000079 // JVNDB: JVNDB-2007-000772 // NVD: CVE-2006-4339

CREDITS

Daniel Bleichenbacher reported this issue to the vendor.

Trust: 0.3

sources: BID: 19849

SOURCES

db:CERT/CCid:VU#386964
db:CERT/CCid:VU#845620
db:CERT/CCid:VU#594904
db:CERT/CCid:VU#547300
db:BIDid:19849
db:PACKETSTORMid:49782
db:PACKETSTORMid:128056
db:PACKETSTORMid:53990
db:PACKETSTORMid:86234
db:PACKETSTORMid:49826
db:PACKETSTORMid:58346
db:PACKETSTORMid:51167
db:PACKETSTORMid:49927
db:PACKETSTORMid:86249
db:JVNDBid:JVNDB-2012-000079
db:JVNDBid:JVNDB-2007-000772
db:NVDid:CVE-2006-4339

LAST UPDATE DATE

2025-09-24T19:52:19.116000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#386964date:2011-07-22T00:00:00
db:CERT/CCid:VU#845620date:2007-02-08T00:00:00
db:CERT/CCid:VU#594904date:2007-02-09T00:00:00
db:CERT/CCid:VU#547300date:2011-07-22T00:00:00
db:BIDid:19849date:2015-03-19T08:19:00
db:JVNDBid:JVNDB-2012-000079date:2014-05-23T00:00:00
db:JVNDBid:JVNDB-2007-000772date:2014-05-23T00:00:00
db:NVDid:CVE-2006-4339date:2025-04-03T01:03:51.193

SOURCES RELEASE DATE

db:CERT/CCid:VU#386964date:2006-09-28T00:00:00
db:CERT/CCid:VU#845620date:2006-09-11T00:00:00
db:CERT/CCid:VU#594904date:2007-02-08T00:00:00
db:CERT/CCid:VU#547300date:2006-09-28T00:00:00
db:BIDid:19849date:2006-09-05T00:00:00
db:PACKETSTORMid:49782date:2006-09-07T09:27:43
db:PACKETSTORMid:128056date:2014-09-02T06:19:02
db:PACKETSTORMid:53990date:2007-01-27T02:35:42
db:PACKETSTORMid:86234date:2010-02-12T13:01:15
db:PACKETSTORMid:49826date:2006-09-08T06:46:12
db:PACKETSTORMid:58346date:2007-08-08T07:19:47
db:PACKETSTORMid:51167date:2006-10-20T22:34:17
db:PACKETSTORMid:49927date:2006-09-13T07:37:56
db:PACKETSTORMid:86249date:2010-02-12T15:35:11
db:JVNDBid:JVNDB-2012-000079date:2012-08-30T00:00:00
db:JVNDBid:JVNDB-2007-000772date:2008-05-21T00:00:00
db:NVDid:CVE-2006-4339date:2006-09-05T17:04:00