ID

VAR-201102-0280


CVE

CVE-2010-4476


TITLE

IBM WebSphere Application Server vulnerable to denial-of-service (DoS)

Trust: 0.8

sources: JVNDB: JVNDB-2011-000017

DESCRIPTION

The Double.parseDouble method in Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier, as used in OpenJDK, Apache, JBossweb, and other products, allows remote attackers to cause a denial of service via a crafted string that triggers an infinite loop of estimations during conversion to a double-precision binary floating-point number, as demonstrated using 2.2250738585072012e-308. A wide range of products are affected. plural Oracle Product Java Runtime Environment Components include Java language and APIs There are vulnerabilities that affect availability due to flaws in the handling of.Service disruption by a third party (DoS) An attack may be carried out. IBM WebSphere Application Server (WAS) contains a denial-of-service (DoS) vulnerability. IBM WebSphere Application Server contains a denial-of-service (DoS) vulnerability due to an issue in Java Runtime Environment (JRE). According to the developer: " For other IBM software products that contain an affected version of WAS, require an update. Specifically, WebSphere Process Server (WPS), WebSphere Enterprise Service Bus (WESB), WebSphere Virtual Enterprise (WVE), WebSphere Commerce and others are applicable. Also, IBM HTTP Server is not affected by this vulnerability."A remote attacker may cause a denial-of-service (DoS). Oracle Java is prone to a remote denial-of-service vulnerability. Successful attacks will cause applications written in Java to hang, creating a denial-of-service condition. The updates are available from: http://www.hp.com/go/java These issues are addressed in the following versions of the HP Java: HP-UX B.11.11 / SDK and JRE v1.4.2.28 or subsequent HP-UX B.11.23 / SDK and JRE v1.4.2.28 or subsequent HP-UX B.11.31 / SDK and JRE v1.4.2.28 or subsequent MANUAL ACTIONS: Yes - Update For Java v1.4.2.27 and earlier, update to Java v1.4.2.28 or subsequent. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Advisory MDVSA-2011:054 http://www.mandriva.com/security/ _______________________________________________________________________ Package : java-1.6.0-openjdk Date : March 27, 2011 Affected: 2009.0, 2010.0, 2010.1, Enterprise Server 5.0 _______________________________________________________________________ Problem Description: Multiple vulnerabilities has been identified and fixed in java-1.6.0-openjdk: The JNLP SecurityManager in IcedTea (IcedTea.so) 1.7 before 1.7.7, 1.8 before 1.8.4, and 1.9 before 1.9.4 for Java OpenJDK returns from the checkPermission method instead of throwing an exception in certain circumstances, which might allow context-dependent attackers to bypass the intended security policy by creating instances of ClassLoader (CVE-2010-4351). NOTE: the previous information was obtained from the February 2011 CPU. Oracle has not commented on claims from a downstream vendor that this issue involves DNS cache poisoning by untrusted applets. NOTE: the previous information was obtained from the February 2011 CPU. Oracle has not commented on claims from a downstream vendor that this issue is an untrusted search path vulnerability involving an empty LD_LIBRARY_PATH environment variable (CVE-2010-4450). NOTE: the previous information was obtained from the February 2011 CPU. Oracle has not commented on claims from a downstream vendor that this issue is related to the lack of framework support by AWT event dispatch, and/or clipboard access in Applets. NOTE: the previous information was obtained from the February 2011 CPU. Oracle has not commented on claims from a downstream vendor that this issue is heap corruption related to the Verifier and backward jsrs. NOTE: the previous information was obtained from the February 2011 CPU. Oracle has not commented on claims from a downstream vendor that this issue is related to Features set on SchemaFactory not inherited by Validator. NOTE: the previous information was obtained from the February 2011 CPU. Oracle has not commented on claims from a downstream vendor that this issue is related to the exposure of system properties via vectors related to Font.createFont and exception text (CVE-2010-4471). NOTE: the previous information was obtained from the February 2011 CPU. Oracle has not commented on claims from a downstream vendor that this issue involves the replacement of the XML DSig Transform or C14N algorithm implementations. IcedTea 1.7 before 1.7.8, 1.8 before 1.8.5, and 1.9 before 1.9.5 does not properly verify signatures for JAR files that (1) are partially signed or (2) signed by multiple entities, which allows remote attackers to trick users into executing code that appears to come from a trusted source (CVE-2011-0025). The JNLPClassLoader class in IcedTea-Web before 1.0.1, as used in OpenJDK Runtime Environment 1.6.0, allows remote attackers to gain privileges via unknown vectors related to multiple signers and the assignment of an inappropriate security descriptor. (CVE-2011-0706) Additionally the java-1.5.0-gcj packages were not rebuilt with the shipped version on GCC for 2009.0 and Enterprise Server 5 which caused problems while building the java-1.6.0-openjdk updates, therefore rebuilt java-1.5.0-gcj packages are being provided with this advisory as well. Packages for 2009.0 are provided as of the Extended Maintenance Program. Please visit this link to learn more: http://store.mandriva.com/product_info.php?cPath=149&amp;products_id=490 The updated packages have been patched to correct this issue. _______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4351 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4448 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4450 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4465 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4469 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4470 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4471 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4472 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4476 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0025 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0706 _______________________________________________________________________ Updated Packages: Mandriva Linux 2009.0: cfea90f1f20d28bf5a2f628e0a910eaa 2009.0/i586/java-1.5.0-gcj-1.5.0.0-17.1.7.1mdv2009.0.i586.rpm d3188bf2f1da126b4d04e920e331d831 2009.0/i586/java-1.5.0-gcj-devel-1.5.0.0-17.1.7.1mdv2009.0.i586.rpm 1b4994018478f335d49531d9d5e60642 2009.0/i586/java-1.5.0-gcj-javadoc-1.5.0.0-17.1.7.1mdv2009.0.i586.rpm 078af1b826c27ea3c7befc88ace7ebd5 2009.0/i586/java-1.5.0-gcj-src-1.5.0.0-17.1.7.1mdv2009.0.i586.rpm d1c6cba2035f8eada4e351310ebf7be2 2009.0/i586/java-1.6.0-openjdk-1.6.0.0-7.b18.5mdv2009.0.i586.rpm 8b53c26f88092819346654a339b44622 2009.0/i586/java-1.6.0-openjdk-demo-1.6.0.0-7.b18.5mdv2009.0.i586.rpm fc8af257ef8db0d37f3bfff954740c0b 2009.0/i586/java-1.6.0-openjdk-devel-1.6.0.0-7.b18.5mdv2009.0.i586.rpm 6cd5f5cdb27e4c8936292aef0aa5010c 2009.0/i586/java-1.6.0-openjdk-javadoc-1.6.0.0-7.b18.5mdv2009.0.i586.rpm 03fdab84535710ac263c08b3870cb062 2009.0/i586/java-1.6.0-openjdk-plugin-1.6.0.0-7.b18.5mdv2009.0.i586.rpm 0232ce60d1d6e1072e50a13f2b416fcc 2009.0/i586/java-1.6.0-openjdk-src-1.6.0.0-7.b18.5mdv2009.0.i586.rpm fc94465e0b7e5fe50095c15726d38699 2009.0/SRPMS/java-1.5.0-gcj-1.5.0.0-17.1.7.1mdv2009.0.src.rpm 79aa73d85fe13e803173a9c520ac1bd8 2009.0/SRPMS/java-1.6.0-openjdk-1.6.0.0-7.b18.5mdv2009.0.src.rpm Mandriva Linux 2009.0/X86_64: 5728fe31661213beab52fe97f9af91ad 2009.0/x86_64/java-1.5.0-gcj-1.5.0.0-17.1.7.1mdv2009.0.x86_64.rpm bd5a2a20d168ddcebe29bb109fea38c2 2009.0/x86_64/java-1.5.0-gcj-devel-1.5.0.0-17.1.7.1mdv2009.0.x86_64.rpm a37818a53a8dbfa85d82bcf3bf83e08f 2009.0/x86_64/java-1.5.0-gcj-javadoc-1.5.0.0-17.1.7.1mdv2009.0.x86_64.rpm ed9d1baa365606c512783863da3e0bd8 2009.0/x86_64/java-1.5.0-gcj-src-1.5.0.0-17.1.7.1mdv2009.0.x86_64.rpm b5e70c75ecc67f8f1f7f22ca55059a8b 2009.0/x86_64/java-1.6.0-openjdk-1.6.0.0-7.b18.5mdv2009.0.x86_64.rpm 071df613e884a9faf3525661280b19d6 2009.0/x86_64/java-1.6.0-openjdk-demo-1.6.0.0-7.b18.5mdv2009.0.x86_64.rpm 81b79e0a8ae29c5bcff3fa6872ad52e9 2009.0/x86_64/java-1.6.0-openjdk-devel-1.6.0.0-7.b18.5mdv2009.0.x86_64.rpm b5818cbad798514f02ee26c346d1e077 2009.0/x86_64/java-1.6.0-openjdk-javadoc-1.6.0.0-7.b18.5mdv2009.0.x86_64.rpm d80e3970d9279df1f9dddd46bcb01380 2009.0/x86_64/java-1.6.0-openjdk-plugin-1.6.0.0-7.b18.5mdv2009.0.x86_64.rpm d72298b296819ab6791e28449d3cf475 2009.0/x86_64/java-1.6.0-openjdk-src-1.6.0.0-7.b18.5mdv2009.0.x86_64.rpm fc94465e0b7e5fe50095c15726d38699 2009.0/SRPMS/java-1.5.0-gcj-1.5.0.0-17.1.7.1mdv2009.0.src.rpm 79aa73d85fe13e803173a9c520ac1bd8 2009.0/SRPMS/java-1.6.0-openjdk-1.6.0.0-7.b18.5mdv2009.0.src.rpm Mandriva Linux 2010.0: bbe3a5e4538edd269e8e8c846d02ec50 2010.0/i586/java-1.6.0-openjdk-1.6.0.0-7.b18.5mdv2010.0.i586.rpm 825fa39b02a627993df166acad99e002 2010.0/i586/java-1.6.0-openjdk-demo-1.6.0.0-7.b18.5mdv2010.0.i586.rpm b30390e1d4457964f60630c95b36e768 2010.0/i586/java-1.6.0-openjdk-devel-1.6.0.0-7.b18.5mdv2010.0.i586.rpm f6123d9a0852fabdf596850979b58e4d 2010.0/i586/java-1.6.0-openjdk-javadoc-1.6.0.0-7.b18.5mdv2010.0.i586.rpm f2ec2f80944f1f401154d2fb2c2ad64d 2010.0/i586/java-1.6.0-openjdk-plugin-1.6.0.0-7.b18.5mdv2010.0.i586.rpm 68ed360de6ee490d80906fd561459faa 2010.0/i586/java-1.6.0-openjdk-src-1.6.0.0-7.b18.5mdv2010.0.i586.rpm f7cb05087b53d464084c1d9975f914b1 2010.0/SRPMS/java-1.6.0-openjdk-1.6.0.0-7.b18.5mdv2010.0.src.rpm Mandriva Linux 2010.0/X86_64: 11e65a4c18288572327dd4c4f8841f94 2010.0/x86_64/java-1.6.0-openjdk-1.6.0.0-7.b18.5mdv2010.0.x86_64.rpm 58bdac45685c3146adb44cb2c006811f 2010.0/x86_64/java-1.6.0-openjdk-demo-1.6.0.0-7.b18.5mdv2010.0.x86_64.rpm e9dfc0bd42192c92b2a788809226ff27 2010.0/x86_64/java-1.6.0-openjdk-devel-1.6.0.0-7.b18.5mdv2010.0.x86_64.rpm afcef69bfa7804c70df2684b2ed19634 2010.0/x86_64/java-1.6.0-openjdk-javadoc-1.6.0.0-7.b18.5mdv2010.0.x86_64.rpm 64ea6c5ab1b71b8a0f163aa1f7581c69 2010.0/x86_64/java-1.6.0-openjdk-plugin-1.6.0.0-7.b18.5mdv2010.0.x86_64.rpm beb768b3e0714331050baf31a8e88bc9 2010.0/x86_64/java-1.6.0-openjdk-src-1.6.0.0-7.b18.5mdv2010.0.x86_64.rpm f7cb05087b53d464084c1d9975f914b1 2010.0/SRPMS/java-1.6.0-openjdk-1.6.0.0-7.b18.5mdv2010.0.src.rpm Mandriva Linux 2010.1: c2736e4b08921bb5de8dbad3e13bb988 2010.1/i586/java-1.6.0-openjdk-1.6.0.0-7.b18.5mdv2010.2.i586.rpm 884207fa52ea3e168710dfb3988229d5 2010.1/i586/java-1.6.0-openjdk-demo-1.6.0.0-7.b18.5mdv2010.2.i586.rpm a0d0a86bbc5dcc9d2eff2dc2e14ae083 2010.1/i586/java-1.6.0-openjdk-devel-1.6.0.0-7.b18.5mdv2010.2.i586.rpm dc1dd774b5eb1efb1a785b0ff4bc8f94 2010.1/i586/java-1.6.0-openjdk-javadoc-1.6.0.0-7.b18.5mdv2010.2.i586.rpm 41cffbd28ed3d467e465328d8369116a 2010.1/i586/java-1.6.0-openjdk-plugin-1.6.0.0-7.b18.5mdv2010.2.i586.rpm ae4064b170d4e2fcd0b4949cd53af79e 2010.1/i586/java-1.6.0-openjdk-src-1.6.0.0-7.b18.5mdv2010.2.i586.rpm f44cc336bcd85dbfd7c589b1b34e1907 2010.1/SRPMS/java-1.6.0-openjdk-1.6.0.0-7.b18.5mdv2010.2.src.rpm Mandriva Linux 2010.1/X86_64: 556d72a8cf60df24274bb49938a2791c 2010.1/x86_64/java-1.6.0-openjdk-1.6.0.0-7.b18.5mdv2010.2.x86_64.rpm e7e183d456383ad562cdb9da84e0f899 2010.1/x86_64/java-1.6.0-openjdk-demo-1.6.0.0-7.b18.5mdv2010.2.x86_64.rpm 035fccb2950b8a87cd4b597c866d5831 2010.1/x86_64/java-1.6.0-openjdk-devel-1.6.0.0-7.b18.5mdv2010.2.x86_64.rpm a76c326c10b87a62be32100d0eddd75f 2010.1/x86_64/java-1.6.0-openjdk-javadoc-1.6.0.0-7.b18.5mdv2010.2.x86_64.rpm 09ad2b77e3c48b3e16010c8c93fa8f9b 2010.1/x86_64/java-1.6.0-openjdk-plugin-1.6.0.0-7.b18.5mdv2010.2.x86_64.rpm 042beb49ddd872902a8faea3e425b792 2010.1/x86_64/java-1.6.0-openjdk-src-1.6.0.0-7.b18.5mdv2010.2.x86_64.rpm f44cc336bcd85dbfd7c589b1b34e1907 2010.1/SRPMS/java-1.6.0-openjdk-1.6.0.0-7.b18.5mdv2010.2.src.rpm Mandriva Enterprise Server 5: 2bf537286d1406c491061e07a73c96ec mes5/i586/java-1.5.0-gcj-1.5.0.0-17.1.7.1mdvmes5.2.i586.rpm fb125806cc547d2c69cf13ae67c835d5 mes5/i586/java-1.5.0-gcj-devel-1.5.0.0-17.1.7.1mdvmes5.2.i586.rpm 657a9fb9b644be8f8a49442a8210d56a mes5/i586/java-1.5.0-gcj-javadoc-1.5.0.0-17.1.7.1mdvmes5.2.i586.rpm fff64cbf465a2a701c248ad5cc4c89c6 mes5/i586/java-1.5.0-gcj-src-1.5.0.0-17.1.7.1mdvmes5.2.i586.rpm 8ba9fe5adad781d341ba764b661c8c92 mes5/i586/java-1.6.0-openjdk-1.6.0.0-7.b18.5mdvmes5.2.i586.rpm 75de95d6064fe9d552795deb0768dfca mes5/i586/java-1.6.0-openjdk-demo-1.6.0.0-7.b18.5mdvmes5.2.i586.rpm 9f5ccbfff9afb405baadfc67f8173617 mes5/i586/java-1.6.0-openjdk-devel-1.6.0.0-7.b18.5mdvmes5.2.i586.rpm 70de70d7adaccff5397814d31bd51a96 mes5/i586/java-1.6.0-openjdk-javadoc-1.6.0.0-7.b18.5mdvmes5.2.i586.rpm 94b138e8a423f2f8c2ad137577bb4d42 mes5/i586/java-1.6.0-openjdk-plugin-1.6.0.0-7.b18.5mdvmes5.2.i586.rpm fd7dc4b050b6e07ea7686a72c2704ccd mes5/i586/java-1.6.0-openjdk-src-1.6.0.0-7.b18.5mdvmes5.2.i586.rpm 2899dfa5a7491a13e85736bf588913d9 mes5/SRPMS/java-1.5.0-gcj-1.5.0.0-17.1.7.1mdv2009.0.src.rpm 4fc6e8041b5a93a3a71082fb1cbead26 mes5/SRPMS/java-1.6.0-openjdk-1.6.0.0-7.b18.5mdvmes5.2.src.rpm Mandriva Enterprise Server 5/X86_64: 11c7cdc078dcd9cf30e818f4fb4c4e1f mes5/x86_64/java-1.5.0-gcj-1.5.0.0-17.1.7.1mdvmes5.2.x86_64.rpm 6c6185f429a1672255e30cf00c2af065 mes5/x86_64/java-1.5.0-gcj-devel-1.5.0.0-17.1.7.1mdvmes5.2.x86_64.rpm f194361aa7a5cfeec17745f0ee158962 mes5/x86_64/java-1.5.0-gcj-javadoc-1.5.0.0-17.1.7.1mdvmes5.2.x86_64.rpm 7d2679d156a618d7ba847ba2ebcede4b mes5/x86_64/java-1.5.0-gcj-src-1.5.0.0-17.1.7.1mdvmes5.2.x86_64.rpm 8ae3d0065764f69d1546a61b895a4244 mes5/x86_64/java-1.6.0-openjdk-1.6.0.0-7.b18.5mdvmes5.2.x86_64.rpm 8ef4ab6f5f8f421c1b36dfae807350a5 mes5/x86_64/java-1.6.0-openjdk-demo-1.6.0.0-7.b18.5mdvmes5.2.x86_64.rpm d504a7493fc86d5750c849f738bb6167 mes5/x86_64/java-1.6.0-openjdk-devel-1.6.0.0-7.b18.5mdvmes5.2.x86_64.rpm 3c044a087cc5225fd9ad138dcea5fa7d mes5/x86_64/java-1.6.0-openjdk-javadoc-1.6.0.0-7.b18.5mdvmes5.2.x86_64.rpm b89fa5785567340525aa5b57c8b9440c mes5/x86_64/java-1.6.0-openjdk-plugin-1.6.0.0-7.b18.5mdvmes5.2.x86_64.rpm 3dc504dbf7161b1026bf41298118a819 mes5/x86_64/java-1.6.0-openjdk-src-1.6.0.0-7.b18.5mdvmes5.2.x86_64.rpm 2899dfa5a7491a13e85736bf588913d9 mes5/SRPMS/java-1.5.0-gcj-1.5.0.0-17.1.7.1mdv2009.0.src.rpm 4fc6e8041b5a93a3a71082fb1cbead26 mes5/SRPMS/java-1.6.0-openjdk-1.6.0.0-7.b18.5mdvmes5.2.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/security/advisories If you want to report vulnerabilities, please contact security_(at)_mandriva.com _______________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team <security*mandriva.com> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) iD8DBQFNj4A1mqjQ0CJFipgRAqd9AKDH+zN9xFfcPlQmGWMRSOqb+xjI4QCfbvvt DHgr6vgcxh6XXAElZkDBIws= =7L47 -----END PGP SIGNATURE----- . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c02822093 Version: 1 HPSBOV02634 SSRT100390 rev.1 - HP OpenVMS running Java, Remote Denial of Service (DoS) NOTICE: The information in this Security Bulletin should be acted upon as soon as possible. Release Date: 2011-05-05 Last Updated: 2011-05-05 Potential Security Impact: Remote Denial of Service (DoS) Source: Hewlett-Packard Company, HP Software Security Response Team VULNERABILITY SUMMARY A potential vulnerability has been identified with HP OpenVMS running Java. The vulnerability could be remotely exploited to create a Denial of Service (DoS). References: CVE-2010-4476 SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. HP OpenVMS running J2SE 1.42 on Alpha platforms: v 1.42-9 and earlier. HP OpenVMS running J2SE 1.42 on I64 platforms: v 1.42-6 and earlier. HP OpenVMS running J2SE 5.0 on Alpha platforms: v 1.50-7 and earlier. HP OpenVMS running J2SE 5.0 on I64 platforms: v 1.50-6 and earlier. HP OpenVMS running Java SE 6 on Alpha and I64 platforms: v 6.0-2 and earlier. BACKGROUND CVSS 2.0 Base Metrics =========================================================== Reference Base Vector Base Score CVE-2010-4476 (AV:N/AC:L/Au:N/C:N/I:N/A:C) 7.8 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002 RESOLUTION HP has made the following software tool available to resolve the vulnerability. The FPUpdater tool (Floating Point Updater) must be run to update the Java Development Kit (JDK) and/or the Java Runtime Environment (JRE) for Java v 1.4-x, v 5.0-x, and v 6.0-x. To download the FPUpdater tool, go to http://h18012.www1.hp.com/java/alpha/fpupdater_index.html HISTORY Version:1 (rev.1) - 5 May 2011 Initial release Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy. Support: For further information, contact normal HP Services support channel. Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com It is strongly recommended that security related information being communicated to HP be encrypted using PGP, especially exploit information. To get the security-alert PGP key, please send an e-mail message as follows: To: security-alert@hp.com Subject: get key Subscribe: To initiate a subscription to receive future HP Security Bulletins via Email: http://h30046.www3.hp.com/driverAlertProfile.php?regioncode=NA&langcode=USENG&jumpid=in_SC-GEN__driverITRC&topiccode=ITRC On the web page: ITRC security bulletins and patch sign-up Under Step1: your ITRC security bulletins and patches -check ALL categories for which alerts are required and continue. Under Step2: your ITRC operating systems -verify your operating system selections are checked and save. To update an existing subscription: http://h30046.www3.hp.com/subSignIn.php Log in on the web page: Subscriber's choice for Business: sign-in. On the web page: Subscriber's Choice: your profile summary - use Edit Profile to update appropriate sections. To review previously published Security Bulletins visit: http://www.itrc.hp.com/service/cki/secBullArchive.do * The Software Product Category that this Security Bulletin relates to is represented by the 5th and 6th characters of the Bulletin number in the title: GN = HP General SW MA = HP Management Agents MI = Misc. 3rd Party SW MP = HP MPE/iX NS = HP NonStop Servers OV = HP OpenVMS PI = HP Printing & Imaging ST = HP Storage SW TL = HP Trusted Linux TU = HP Tru64 UNIX UX = HP-UX VV = HP VirtualVault System management and security procedures must be reviewed frequently to maintain system integrity. HP is continually reviewing and enhancing the security features of software products to provide customers with current secure solutions. "HP is broadly distributing this Security Bulletin in order to bring to the attention of users of the affected HP products the important security information contained in this Bulletin. HP recommends that all users determine the applicability of this information to their individual situations and take appropriate action. HP does not warrant that this information is necessarily accurate or complete for all user situations and, consequently, HP will not be responsible for any damages resulting from user's use or disregard of the information provided in this Bulletin. To the extent permitted by law, HP disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose, title and non-infringement." Copyright 2011 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits;damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux) iEYEARECAAYFAk3C8qwACgkQ4B86/C0qfVkgSwCdErQezT2ZMSfx61jDn8lgarYF hCgAoMpFi1D/6TkGP5C1KwKiMsbNUM0A =KFeW -----END PGP SIGNATURE----- . Summary: Updated java-1.6.0-ibm packages that fix several security issues are now available for Red Hat Network Satellite 5.4.1 for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having low security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Network Satellite Server 5.4 (RHEL v.5) - i386, s390x, x86_64 3. In a typical operating environment, these are of low security risk as the runtime is not used on untrusted applets. Detailed vulnerability descriptions are linked from the IBM "Security alerts" page, listed in the References section. (CVE-2009-3555, CVE-2010-1321, CVE-2010-3541, CVE-2010-3548, CVE-2010-3549, CVE-2010-3550, CVE-2010-3551, CVE-2010-3553, CVE-2010-3555, CVE-2010-3556, CVE-2010-3557, CVE-2010-3558, CVE-2010-3560, CVE-2010-3562, CVE-2010-3563, CVE-2010-3565, CVE-2010-3566, CVE-2010-3568, CVE-2010-3569, CVE-2010-3571, CVE-2010-3572, CVE-2010-3573, CVE-2010-3574, CVE-2010-4422, CVE-2010-4447, CVE-2010-4448, CVE-2010-4452, CVE-2010-4454, CVE-2010-4462, CVE-2010-4463, CVE-2010-4465, CVE-2010-4466, CVE-2010-4467, CVE-2010-4468, CVE-2010-4471, CVE-2010-4473, CVE-2010-4475, CVE-2010-4476) Users of Red Hat Network Satellite 5.4.1 are advised to upgrade to these updated java-1.6.0-ibm packages, which contain the IBM 1.6.0 SR9-FP1 Java release. For this update to take effect, Red Hat Network Satellite must be restarted. Refer to the Solution section for details. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 Run the following command to restart the Red Hat Network Satellite server: # rhn-satellite restart 5. Bugs fixed (http://bugzilla.redhat.com/): 533125 - CVE-2009-3555 TLS: MITM attacks via session renegotiation 582466 - CVE-2010-1321 krb5: null pointer dereference in GSS-API library leads to DoS (MITKRB5-SA-2010-005) 639876 - CVE-2010-3568 OpenJDK Deserialization Race condition (6559775) 639897 - CVE-2010-3562 OpenJDK IndexColorModel double-free (6925710) 639904 - CVE-2010-3557 OpenJDK Swing mutable static (6938813) 639909 - CVE-2010-3548 OpenJDK DNS server IP address information leak (6957564) 639920 - CVE-2010-3565 OpenJDK JPEG writeImage remote code execution (6963023) 639922 - CVE-2010-3566 OpenJDK ICC Profile remote code execution (6963489) 639925 - CVE-2010-3569 OpenJDK Serialization inconsistencies (6966692) 642167 - CVE-2010-3553 OpenJDK Swing unsafe reflection usage (6622002) 642180 - CVE-2010-3549 OpenJDK HttpURLConnection request splitting (6952017) 642187 - CVE-2010-3551 OpenJDK local network address disclosure (6952603) 642202 - CVE-2010-3541 CVE-2010-3573 OpenJDK HttpURLConnection allows arbitrary request headers (6961084,6980004) 642215 - CVE-2010-3574 OpenJDK HttpURLConnection incomplete TRACE permission check (6981426) 642558 - CVE-2010-3555 JDK unspecified vulnerability in Deployment component 642559 - CVE-2010-3550 JDK unspecified vulnerability in Java Web Start component 642573 - CVE-2010-3560 JDK unspecified vulnerability in Networking component 642576 - CVE-2010-3556 JDK unspecified vulnerability in 2D component 642585 - CVE-2010-3571 JDK unspecified vulnerability in 2D component 642589 - CVE-2010-3563 JDK unspecified vulnerability in Deployment component 642593 - CVE-2010-3558 JDK unspecified vulnerability in Java Web Start component 642611 - CVE-2010-3572 JDK unspecified vulnerability in Sound component 674336 - CVE-2010-4476 JDK Double.parseDouble Denial-Of-Service 675984 - CVE-2010-4465 OpenJDK Swing timer-based security manager bypass (6907662) 676019 - CVE-2010-4471 OpenJDK Java2D font-related system property leak (6985453) 676023 - CVE-2010-4448 OpenJDK DNS cache poisoning by untrusted applets (6981922) 677957 - CVE-2010-4475 JDK unspecified vulnerability in Deployment component 677958 - CVE-2010-4473 JDK unspecified vulnerability in Sound component 677959 - CVE-2010-4468 JDK unspecified vulnerability in JDBC component 677960 - CVE-2010-4467 JDK unspecified vulnerability in Deployment component 677961 - CVE-2010-4466 JDK unspecified vulnerability in Deployment component 677963 - CVE-2010-4463 JDK unspecified vulnerability in Deployment component 677966 - CVE-2010-4462 JDK unspecified vulnerability in Sound component 677967 - CVE-2010-4454 JDK unspecified vulnerability in Sound component 677968 - CVE-2010-4452 JDK unspecified vulnerability in Deployment component 677970 - CVE-2010-4447 JDK unspecified vulnerability in Deployment component 677971 - CVE-2010-4422 JDK unspecified vulnerability in Deployment component 6. Package List: Red Hat Network Satellite Server 5.4 (RHEL v.5): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/RHNSAT/SRPMS/java-1.6.0-ibm-1.6.0.9.1-1jpp.1.el5.src.rpm i386: java-1.6.0-ibm-1.6.0.9.1-1jpp.1.el5.i386.rpm java-1.6.0-ibm-devel-1.6.0.9.1-1jpp.1.el5.i386.rpm s390x: java-1.6.0-ibm-1.6.0.9.1-1jpp.1.el5.s390x.rpm java-1.6.0-ibm-devel-1.6.0.9.1-1jpp.1.el5.s390x.rpm x86_64: java-1.6.0-ibm-1.6.0.9.1-1jpp.1.el5.x86_64.rpm java-1.6.0-ibm-devel-1.6.0.9.1-1jpp.1.el5.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2009-3555.html https://www.redhat.com/security/data/cve/CVE-2010-1321.html https://www.redhat.com/security/data/cve/CVE-2010-3541.html https://www.redhat.com/security/data/cve/CVE-2010-3548.html https://www.redhat.com/security/data/cve/CVE-2010-3549.html https://www.redhat.com/security/data/cve/CVE-2010-3550.html https://www.redhat.com/security/data/cve/CVE-2010-3551.html https://www.redhat.com/security/data/cve/CVE-2010-3553.html https://www.redhat.com/security/data/cve/CVE-2010-3555.html https://www.redhat.com/security/data/cve/CVE-2010-3556.html https://www.redhat.com/security/data/cve/CVE-2010-3557.html https://www.redhat.com/security/data/cve/CVE-2010-3558.html https://www.redhat.com/security/data/cve/CVE-2010-3560.html https://www.redhat.com/security/data/cve/CVE-2010-3562.html https://www.redhat.com/security/data/cve/CVE-2010-3563.html https://www.redhat.com/security/data/cve/CVE-2010-3565.html https://www.redhat.com/security/data/cve/CVE-2010-3566.html https://www.redhat.com/security/data/cve/CVE-2010-3568.html https://www.redhat.com/security/data/cve/CVE-2010-3569.html https://www.redhat.com/security/data/cve/CVE-2010-3571.html https://www.redhat.com/security/data/cve/CVE-2010-3572.html https://www.redhat.com/security/data/cve/CVE-2010-3573.html https://www.redhat.com/security/data/cve/CVE-2010-3574.html https://www.redhat.com/security/data/cve/CVE-2010-4422.html https://www.redhat.com/security/data/cve/CVE-2010-4447.html https://www.redhat.com/security/data/cve/CVE-2010-4448.html https://www.redhat.com/security/data/cve/CVE-2010-4452.html https://www.redhat.com/security/data/cve/CVE-2010-4454.html https://www.redhat.com/security/data/cve/CVE-2010-4462.html https://www.redhat.com/security/data/cve/CVE-2010-4463.html https://www.redhat.com/security/data/cve/CVE-2010-4465.html https://www.redhat.com/security/data/cve/CVE-2010-4466.html https://www.redhat.com/security/data/cve/CVE-2010-4467.html https://www.redhat.com/security/data/cve/CVE-2010-4468.html https://www.redhat.com/security/data/cve/CVE-2010-4471.html https://www.redhat.com/security/data/cve/CVE-2010-4473.html https://www.redhat.com/security/data/cve/CVE-2010-4475.html https://www.redhat.com/security/data/cve/CVE-2010-4476.html https://access.redhat.com/security/updates/classification/#low http://www.ibm.com/developerworks/java/jdk/alerts/ 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. =========================================================== Ubuntu Security Notice USN-1079-3 March 17, 2011 openjdk-6b18 vulnerabilities CVE-2010-4448, CVE-2010-4450, CVE-2010-4465, CVE-2010-4469, CVE-2010-4470, CVE-2010-4471, CVE-2010-4472, CVE-2010-4476, CVE-2011-0706 =========================================================== A security issue affects the following Ubuntu releases: Ubuntu 10.10 This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 10.10: icedtea6-plugin 6b18-1.8.7-0ubuntu2.1 openjdk-6-jre 6b18-1.8.7-0ubuntu2.1 openjdk-6-jre-headless 6b18-1.8.7-0ubuntu2.1 After a standard system update you need to restart any Java services, applications or applets to make all the necessary changes. Details follow: USN-1079-2 fixed vulnerabilities in OpenJDK 6 for armel (ARM) architectures in Ubuntu 9.10 and Ubuntu 10.04 LTS. Original advisory details: It was discovered that untrusted Java applets could create domain name resolution cache entries, allowing an attacker to manipulate name resolution within the JVM. (CVE-2010-4448) It was discovered that the Java launcher did not did not properly setup the LD_LIBRARY_PATH environment variable. A local attacker could exploit this to execute arbitrary code as the user invoking the program. (CVE-2010-4450) It was discovered that within the Swing library, forged timer events could allow bypass of SecurityManager checks. This could allow an attacker to access restricted resources. (CVE-2010-4465) It was discovered that certain bytecode combinations confused memory management within the HotSpot JVM. This could allow an attacker to cause a denial of service through an application crash or possibly inject code. (CVE-2010-4469) It was discovered that the way JAXP components were handled allowed them to be manipulated by untrusted applets. An attacker could use this to bypass XML processing restrictions and elevate privileges. (CVE-2010-4470) It was discovered that the Java2D subcomponent, when processing broken CFF fonts could leak system properties. (CVE-2010-4471) It was discovered that a flaw in the XML Digital Signature component could allow an attacker to cause untrusted code to replace the XML Digital Signature Transform or C14N algorithm implementations. (CVE-2010-4472) Konstantin Prei\xdfer and others discovered that specific double literals were improperly handled, allowing a remote attacker to cause a denial of service. (CVE-2011-0706) Updated packages for Ubuntu 10.10: Source archives: http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6b18/openjdk-6b18_6b18-1.8.7-0ubuntu2.1.diff.gz Size/MD5: 149561 b35ae7a82db49282379d36e7ece58484 http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6b18/openjdk-6b18_6b18-1.8.7-0ubuntu2.1.dsc Size/MD5: 3015 04cb459aeaab6c228e722caf07a44de9 http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6b18/openjdk-6b18_6b18-1.8.7.orig.tar.gz Size/MD5: 71430490 b2811b2e53cd9abaad6959d33fe10d19 armel architecture (ARM Architecture): http://ports.ubuntu.com/pool/main/o/openjdk-6b18/icedtea-6-jre-cacao_6b18-1.8.7-0ubuntu2.1_armel.deb Size/MD5: 377802 d4439da20492eafbccb33e2fe979e8c9 http://ports.ubuntu.com/pool/main/o/openjdk-6b18/icedtea6-plugin_6b18-1.8.7-0ubuntu2.1_armel.deb Size/MD5: 78338 7bdf93e00fd81dc82fd0d9a8b4e905c7 http://ports.ubuntu.com/pool/main/o/openjdk-6b18/openjdk-6-dbg_6b18-1.8.7-0ubuntu2.1_armel.deb Size/MD5: 85497146 1512e0d6563dd5120729cf5b993c618c http://ports.ubuntu.com/pool/main/o/openjdk-6b18/openjdk-6-demo_6b18-1.8.7-0ubuntu2.1_armel.deb Size/MD5: 1545620 544c54891d44bdac534c81318a7f2bcb http://ports.ubuntu.com/pool/main/o/openjdk-6b18/openjdk-6-jdk_6b18-1.8.7-0ubuntu2.1_armel.deb Size/MD5: 9140042 0a2d6ed937081800baeb6fc55326a754 http://ports.ubuntu.com/pool/main/o/openjdk-6b18/openjdk-6-jre-headless_6b18-1.8.7-0ubuntu2.1_armel.deb Size/MD5: 30092886 4cc5ad7c54638278e55ee7d2acaab413 http://ports.ubuntu.com/pool/main/o/openjdk-6b18/openjdk-6-jre_6b18-1.8.7-0ubuntu2.1_armel.deb Size/MD5: 266102 4278c2c06387cf883325356efda3c4d4 http://ports.ubuntu.com/pool/universe/o/openjdk-6b18/openjdk-6-jre-zero_6b18-1.8.7-0ubuntu2.1_armel.deb Size/MD5: 1959296 6becfb4d5a2ecbe7aee622b84df57f12 . Customers should open a support case to request the following hotfixes. NNMi Version / Operating System Required Patch Hotfix 9.1x HP-UX Patch 4 Hotfix-NNMi-9.1xP4-HP-UX-JDK-20120710.zip 9.1x Linux Patch 4 Hotfix-NNMi-9.1xP4-Linux-JDK-20120523.zip 9.1x Solaris Patch 4 Hotfix-NNMi-9.1xP4-Solaris-JDK-20120523.zip 9.1x Windows Patch 4 Hotfix-NNMi-9.1xP4-Windows-JDK-20120523.zip Note: The hotfix must be installed after the required patch. The hotfix must be reinstalled if the required patch is reinstalled. MANUAL ACTIONS: Yes - Update Install the applicable patch and hotfix. PRODUCT SPECIFIC INFORMATION HP-UX Software Assistant: HP-UX Software Assistant is an enhanced application that replaces HP-UX Security Patch Check. It analyzes all Security Bulletins issued by HP and lists recommended actions that may apply to a specific HP-UX system. It can also download patches and create a depot automatically. For more information see: https://www.hp.com/go/swa The following text is for use by the HP-UX Software Assistant. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201406-32 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: High Title: IcedTea JDK: Multiple vulnerabilities Date: June 29, 2014 Bugs: #312297, #330205, #340819, #346799, #352035, #353418, #354231, #355127, #370787, #387637, #404095, #421031, #429522, #433389, #438750, #442478, #457206, #458410, #461714, #466822, #477210, #489570, #508270 ID: 201406-32 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities have been found in the IcedTea JDK, the worst of which could lead to arbitrary code execution. Background ========== IcedTea is a distribution of the Java OpenJDK source code built with free build tools. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 dev-java/icedtea-bin < 6.1.13.3 >= 6.1.13.3 Description =========== Multiple vulnerabilities have been discovered in the IcedTea JDK. Please review the CVE identifiers referenced below for details. Workaround ========== There is no known workaround at this time. Resolution ========== All IcedTea JDK users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=dev-java/icedtea-bin-6.1.13.3" References ========== [ 1 ] CVE-2009-3555 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3555 [ 2 ] CVE-2010-2548 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2548 [ 3 ] CVE-2010-2783 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2783 [ 4 ] CVE-2010-3541 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3541 [ 5 ] CVE-2010-3548 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3548 [ 6 ] CVE-2010-3549 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3549 [ 7 ] CVE-2010-3551 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3551 [ 8 ] CVE-2010-3553 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3553 [ 9 ] CVE-2010-3554 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3554 [ 10 ] CVE-2010-3557 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3557 [ 11 ] CVE-2010-3561 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3561 [ 12 ] CVE-2010-3562 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3562 [ 13 ] CVE-2010-3564 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3564 [ 14 ] CVE-2010-3565 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3565 [ 15 ] CVE-2010-3566 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3566 [ 16 ] CVE-2010-3567 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3567 [ 17 ] CVE-2010-3568 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3568 [ 18 ] CVE-2010-3569 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3569 [ 19 ] CVE-2010-3573 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3573 [ 20 ] CVE-2010-3574 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3574 [ 21 ] CVE-2010-3860 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3860 [ 22 ] CVE-2010-4351 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4351 [ 23 ] CVE-2010-4448 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4448 [ 24 ] CVE-2010-4450 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4450 [ 25 ] CVE-2010-4465 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4465 [ 26 ] CVE-2010-4467 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4467 [ 27 ] CVE-2010-4469 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4469 [ 28 ] CVE-2010-4470 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4470 [ 29 ] CVE-2010-4471 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4471 [ 30 ] CVE-2010-4472 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4472 [ 31 ] CVE-2010-4476 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4476 [ 32 ] CVE-2011-0025 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0025 [ 33 ] CVE-2011-0706 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0706 [ 34 ] CVE-2011-0815 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0815 [ 35 ] CVE-2011-0822 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0822 [ 36 ] CVE-2011-0862 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0862 [ 37 ] CVE-2011-0864 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0864 [ 38 ] CVE-2011-0865 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0865 [ 39 ] CVE-2011-0868 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0868 [ 40 ] CVE-2011-0869 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0869 [ 41 ] CVE-2011-0870 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0870 [ 42 ] CVE-2011-0871 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0871 [ 43 ] CVE-2011-0872 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0872 [ 44 ] CVE-2011-3389 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3389 [ 45 ] CVE-2011-3521 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3521 [ 46 ] CVE-2011-3544 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3544 [ 47 ] CVE-2011-3547 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3547 [ 48 ] CVE-2011-3548 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3548 [ 49 ] CVE-2011-3551 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3551 [ 50 ] CVE-2011-3552 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3552 [ 51 ] CVE-2011-3553 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3553 [ 52 ] CVE-2011-3554 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3554 [ 53 ] CVE-2011-3556 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3556 [ 54 ] CVE-2011-3557 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3557 [ 55 ] CVE-2011-3558 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3558 [ 56 ] CVE-2011-3560 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3560 [ 57 ] CVE-2011-3563 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3563 [ 58 ] CVE-2011-3571 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3571 [ 59 ] CVE-2011-5035 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-5035 [ 60 ] CVE-2012-0497 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0497 [ 61 ] CVE-2012-0501 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0501 [ 62 ] CVE-2012-0502 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0502 [ 63 ] CVE-2012-0503 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0503 [ 64 ] CVE-2012-0505 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0505 [ 65 ] CVE-2012-0506 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0506 [ 66 ] CVE-2012-0547 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0547 [ 67 ] CVE-2012-1711 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1711 [ 68 ] CVE-2012-1713 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1713 [ 69 ] CVE-2012-1716 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1716 [ 70 ] CVE-2012-1717 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1717 [ 71 ] CVE-2012-1718 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1718 [ 72 ] CVE-2012-1719 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1719 [ 73 ] CVE-2012-1723 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1723 [ 74 ] CVE-2012-1724 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1724 [ 75 ] CVE-2012-1725 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1725 [ 76 ] CVE-2012-1726 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1726 [ 77 ] CVE-2012-3216 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3216 [ 78 ] CVE-2012-3422 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3422 [ 79 ] CVE-2012-3423 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3423 [ 80 ] CVE-2012-4416 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4416 [ 81 ] CVE-2012-4540 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4540 [ 82 ] CVE-2012-5068 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5068 [ 83 ] CVE-2012-5069 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5069 [ 84 ] CVE-2012-5070 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5070 [ 85 ] CVE-2012-5071 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5071 [ 86 ] CVE-2012-5072 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5072 [ 87 ] CVE-2012-5073 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5073 [ 88 ] CVE-2012-5074 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5074 [ 89 ] CVE-2012-5075 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5075 [ 90 ] CVE-2012-5076 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5076 [ 91 ] CVE-2012-5077 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5077 [ 92 ] CVE-2012-5081 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5081 [ 93 ] CVE-2012-5084 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5084 [ 94 ] CVE-2012-5085 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5085 [ 95 ] CVE-2012-5086 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5086 [ 96 ] CVE-2012-5087 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5087 [ 97 ] CVE-2012-5089 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5089 [ 98 ] CVE-2012-5979 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5979 [ 99 ] CVE-2013-0169 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0169 [ 100 ] CVE-2013-0401 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0401 [ 101 ] CVE-2013-0424 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0424 [ 102 ] CVE-2013-0425 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0425 [ 103 ] CVE-2013-0426 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0426 [ 104 ] CVE-2013-0427 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0427 [ 105 ] CVE-2013-0428 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0428 [ 106 ] CVE-2013-0429 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0429 [ 107 ] CVE-2013-0431 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0431 [ 108 ] CVE-2013-0432 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0432 [ 109 ] CVE-2013-0433 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0433 [ 110 ] CVE-2013-0434 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0434 [ 111 ] CVE-2013-0435 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0435 [ 112 ] CVE-2013-0440 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0440 [ 113 ] CVE-2013-0441 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0441 [ 114 ] CVE-2013-0442 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0442 [ 115 ] CVE-2013-0443 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0443 [ 116 ] CVE-2013-0444 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0444 [ 117 ] CVE-2013-0450 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0450 [ 118 ] CVE-2013-0809 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0809 [ 119 ] CVE-2013-1475 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1475 [ 120 ] CVE-2013-1476 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1476 [ 121 ] CVE-2013-1478 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1478 [ 122 ] CVE-2013-1480 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1480 [ 123 ] CVE-2013-1484 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1484 [ 124 ] CVE-2013-1485 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1485 [ 125 ] CVE-2013-1486 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1486 [ 126 ] CVE-2013-1488 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1488 [ 127 ] CVE-2013-1493 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1493 [ 128 ] CVE-2013-1500 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1500 [ 129 ] CVE-2013-1518 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1518 [ 130 ] CVE-2013-1537 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1537 [ 131 ] CVE-2013-1557 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1557 [ 132 ] CVE-2013-1569 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1569 [ 133 ] CVE-2013-1571 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1571 [ 134 ] CVE-2013-2383 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2383 [ 135 ] CVE-2013-2384 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2384 [ 136 ] CVE-2013-2407 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2407 [ 137 ] CVE-2013-2412 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2412 [ 138 ] CVE-2013-2415 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2415 [ 139 ] CVE-2013-2417 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2417 [ 140 ] CVE-2013-2419 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2419 [ 141 ] CVE-2013-2420 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2420 [ 142 ] CVE-2013-2421 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2421 [ 143 ] CVE-2013-2422 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2422 [ 144 ] CVE-2013-2423 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2423 [ 145 ] CVE-2013-2424 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2424 [ 146 ] CVE-2013-2426 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2426 [ 147 ] CVE-2013-2429 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2429 [ 148 ] CVE-2013-2430 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2430 [ 149 ] CVE-2013-2431 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2431 [ 150 ] CVE-2013-2436 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2436 [ 151 ] CVE-2013-2443 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2443 [ 152 ] CVE-2013-2444 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2444 [ 153 ] CVE-2013-2445 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2445 [ 154 ] CVE-2013-2446 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2446 [ 155 ] CVE-2013-2447 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2447 [ 156 ] CVE-2013-2448 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2448 [ 157 ] CVE-2013-2449 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2449 [ 158 ] CVE-2013-2450 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2450 [ 159 ] CVE-2013-2451 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2451 [ 160 ] CVE-2013-2452 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2452 [ 161 ] CVE-2013-2453 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2453 [ 162 ] CVE-2013-2454 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2454 [ 163 ] CVE-2013-2455 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2455 [ 164 ] CVE-2013-2456 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2456 [ 165 ] CVE-2013-2457 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2457 [ 166 ] CVE-2013-2458 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2458 [ 167 ] CVE-2013-2459 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2459 [ 168 ] CVE-2013-2460 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2460 [ 169 ] CVE-2013-2461 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2461 [ 170 ] CVE-2013-2463 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2463 [ 171 ] CVE-2013-2465 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2465 [ 172 ] CVE-2013-2469 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2469 [ 173 ] CVE-2013-2470 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2470 [ 174 ] CVE-2013-2471 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2471 [ 175 ] CVE-2013-2472 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2472 [ 176 ] CVE-2013-2473 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2473 [ 177 ] CVE-2013-3829 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3829 [ 178 ] CVE-2013-4002 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4002 [ 179 ] CVE-2013-5772 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5772 [ 180 ] CVE-2013-5774 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5774 [ 181 ] CVE-2013-5778 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5778 [ 182 ] CVE-2013-5780 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5780 [ 183 ] CVE-2013-5782 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5782 [ 184 ] CVE-2013-5783 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5783 [ 185 ] CVE-2013-5784 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5784 [ 186 ] CVE-2013-5790 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5790 [ 187 ] CVE-2013-5797 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5797 [ 188 ] CVE-2013-5800 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5800 [ 189 ] CVE-2013-5802 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5802 [ 190 ] CVE-2013-5803 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5803 [ 191 ] CVE-2013-5804 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5804 [ 192 ] CVE-2013-5805 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5805 [ 193 ] CVE-2013-5806 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5806 [ 194 ] CVE-2013-5809 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5809 [ 195 ] CVE-2013-5814 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5814 [ 196 ] CVE-2013-5817 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5817 [ 197 ] CVE-2013-5820 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5820 [ 198 ] CVE-2013-5823 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5823 [ 199 ] CVE-2013-5825 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5825 [ 200 ] CVE-2013-5829 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5829 [ 201 ] CVE-2013-5830 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5830 [ 202 ] CVE-2013-5840 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5840 [ 203 ] CVE-2013-5842 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5842 [ 204 ] CVE-2013-5849 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5849 [ 205 ] CVE-2013-5850 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5850 [ 206 ] CVE-2013-5851 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5851 [ 207 ] CVE-2013-6629 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6629 [ 208 ] CVE-2013-6954 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6954 [ 209 ] CVE-2014-0429 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0429 [ 210 ] CVE-2014-0446 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0446 [ 211 ] CVE-2014-0451 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0451 [ 212 ] CVE-2014-0452 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0452 [ 213 ] CVE-2014-0453 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0453 [ 214 ] CVE-2014-0456 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0456 [ 215 ] CVE-2014-0457 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0457 [ 216 ] CVE-2014-0458 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0458 [ 217 ] CVE-2014-0459 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0459 [ 218 ] CVE-2014-0460 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0460 [ 219 ] CVE-2014-0461 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0461 [ 220 ] CVE-2014-1876 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1876 [ 221 ] CVE-2014-2397 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2397 [ 222 ] CVE-2014-2398 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2398 [ 223 ] CVE-2014-2403 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2403 [ 224 ] CVE-2014-2412 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2412 [ 225 ] CVE-2014-2414 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2414 [ 226 ] CVE-2014-2421 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2421 [ 227 ] CVE-2014-2423 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2423 [ 228 ] CVE-2014-2427 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2427 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-201406-32.xml Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2014 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5 . ---------------------------------------------------------------------- Secure your corporate defenses and reduce complexity in handling vulnerability threats with the new Secunia Vulnerability Intelligence Manager (VIM). Request a free trial: http://secunia.com/products/corporate/vim/ ---------------------------------------------------------------------- TITLE: Apache Tomcat Multiple Vulnerabilities SECUNIA ADVISORY ID: SA43194 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/43194/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=43194 RELEASE DATE: 2011-02-08 DISCUSS ADVISORY: http://secunia.com/advisories/43194/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/43194/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=43194 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: Multiple vulnerabilities have been reported in Apache Tomcat, which can be exploited by malicious, local users to bypass certain security restrictions and by malicious people to conduct cross-site scripting attacks and cause a DoS (Denial of Service). For more information: SA43198 1) An error due to the "maxHttpHeaderSize" limit not being enforced in the NIO HTTP connector can be exploited to cause an "OutOfMemory" error via a specially crafted web request. SOLUTION: Update to a fixed version. PROVIDED AND/OR DISCOVERED BY: Reported by the vendor. ORIGINAL ADVISORY: http://tomcat.apache.org/security-6.html http://tomcat.apache.org/security-7.html OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXPLOIT: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 4.5

sources: NVD: CVE-2010-4476 // JVNDB: JVNDB-2011-000020 // JVNDB: JVNDB-2011-001185 // JVNDB: JVNDB-2011-000017 // BID: 46091 // PACKETSTORM: 111920 // PACKETSTORM: 112826 // PACKETSTORM: 99798 // PACKETSTORM: 101245 // VULMON: CVE-2010-4476 // PACKETSTORM: 98795 // PACKETSTORM: 102374 // PACKETSTORM: 99459 // PACKETSTORM: 114812 // PACKETSTORM: 102969 // PACKETSTORM: 127267 // PACKETSTORM: 121037 // PACKETSTORM: 98203

AFFECTED PRODUCTS

vendor:hitachimodel:cosminexus application server enterprise 06-50-/ascope: - version: -

Trust: 2.1

vendor:hitachimodel:cosminexus application server enterprise 06-00-/ascope: - version: -

Trust: 2.1

vendor:hitachimodel:cosminexus application server standard 06-50-/bscope: - version: -

Trust: 2.1

vendor:hitachimodel:ucosminexus application server enterprise 06-70-/bscope: - version: -

Trust: 2.1

vendor:hitachimodel:cosminexus application server standard 06-50-/ascope: - version: -

Trust: 2.1

vendor:hitachimodel:ucosminexus application server enterprise 06-70-/cscope: - version: -

Trust: 2.1

vendor:hitachimodel:ucosminexus application server standard 06-70-/bscope: - version: -

Trust: 2.1

vendor:hitachimodel:ucosminexus application server standard 06-70-/cscope: - version: -

Trust: 2.1

vendor:hitachimodel:cosminexus application server enterprise 06-50-/bscope: - version: -

Trust: 2.1

vendor:hitachimodel:cosminexus application server standard 06-00-/ascope: - version: -

Trust: 2.1

vendor:sunmodel:jrescope:eqversion:1.4.2

Trust: 1.9

vendor:sunmodel:sdkscope:eqversion:1.4.2

Trust: 1.9

vendor:hitachimodel:ucosminexus service platformscope:eqversion:08-00-01

Trust: 1.8

vendor:hitachimodel:ucosminexus service architectscope:eqversion:08-00-01

Trust: 1.8

vendor:hitachimodel:cosminexus application server standard 06-50-/cscope: - version: -

Trust: 1.8

vendor:hitachimodel:ucosminexus application server standardscope:eqversion:08-00-01

Trust: 1.8

vendor:hitachimodel:ucosminexus application server standard 06-70-/ascope: - version: -

Trust: 1.8

vendor:hitachimodel:ucosminexus application server enterprise 06-70-/fscope: - version: -

Trust: 1.8

vendor:hitachimodel:cosminexus application server enterprise 06-00-/bscope: - version: -

Trust: 1.8

vendor:hitachimodel:ucosminexus application server enterprisescope:eqversion:07-10

Trust: 1.8

vendor:hitachimodel:cosminexus application server standard 06-00-/bscope: - version: -

Trust: 1.8

vendor:hitachimodel:ucosminexus clientscope:eqversion:08-00-01

Trust: 1.8

vendor:hitachimodel:cosminexus application server enterprise 06-50-/cscope: - version: -

Trust: 1.8

vendor:hitachimodel:ucosminexus application server enterprise 06-70-/ascope: - version: -

Trust: 1.8

vendor:hitachimodel:ucosminexus application server standard 06-70-/fscope: - version: -

Trust: 1.8

vendor:hitachimodel:ucosminexus application server enterprisescope:eqversion:08-00-01

Trust: 1.8

vendor:sunmodel:jrescope:eqversion:1.5.0

Trust: 1.6

vendor:hewlett packard l pmodel:hp systems insight managerscope:eqversion:prior to v7.0

Trust: 1.6

vendor:hitachimodel:cosminexus application server standardscope:eqversion:06-50

Trust: 1.5

vendor:hitachimodel:ucosminexus application server standardscope:eqversion:07-10

Trust: 1.5

vendor:hitachimodel:ucosminexus application server standard 06-70-/dscope: - version: -

Trust: 1.5

vendor:hitachimodel:ucosminexus application server standard 06-70-/gscope: - version: -

Trust: 1.5

vendor:hitachimodel:ucosminexus application server enterprisescope:eqversion:06-70

Trust: 1.5

vendor:hitachimodel:cosminexus application server enterprise 06-00-/cscope: - version: -

Trust: 1.5

vendor:sunmodel:jre 011scope:eqversion:1.2.2

Trust: 1.5

vendor:hitachimodel:cosminexus application server standard 06-00-/escope: - version: -

Trust: 1.5

vendor:hitachimodel:cosminexus application server enterprisescope:eqversion:06-00

Trust: 1.5

vendor:hitachimodel:ucosminexus application server standard 06-70-/escope: - version: -

Trust: 1.5

vendor:hitachimodel:cosminexus application server standard 06-00-/dscope: - version: -

Trust: 1.5

vendor:hitachimodel:cosminexus application server standard 06-50-/escope: - version: -

Trust: 1.5

vendor:hitachimodel:cosminexus application server enterprise 06-00-/escope: - version: -

Trust: 1.5

vendor:hitachimodel:cosminexus application server enterprise 06-50-/escope: - version: -

Trust: 1.5

vendor:hitachimodel:cosminexus application server standardscope:eqversion:06-00

Trust: 1.5

vendor:hitachimodel:ucosminexus application server enterprise 06-70-/escope: - version: -

Trust: 1.5

vendor:hitachimodel:cosminexus application server standard 06-00-/cscope: - version: -

Trust: 1.5

vendor:sunmodel:jre 010scope:eqversion:1.2.2

Trust: 1.5

vendor:hitachimodel:ucosminexus application server standardscope:eqversion:06-70

Trust: 1.5

vendor:hitachimodel:cosminexus application server enterprisescope:eqversion:06-50

Trust: 1.5

vendor:hitachimodel:ucosminexus application server enterprise 06-70-/dscope: - version: -

Trust: 1.5

vendor:hitachimodel:cosminexus application server enterprise 06-00-/dscope: - version: -

Trust: 1.5

vendor:hitachimodel:ucosminexus application server enterprisescope:eqversion:07-00

Trust: 1.2

vendor:hitachimodel:cosminexus application server 05-05-/iscope: - version: -

Trust: 1.2

vendor:hitachimodel:cosminexus application serverscope:eqversion:05-05

Trust: 1.2

vendor:hitachimodel:ucosminexus clientscope:eqversion:07-00-06

Trust: 1.2

vendor:hitachimodel:cosminexus application server 05-05-/dscope: - version: -

Trust: 1.2

vendor:sunmodel:jre 013scope:eqversion:1.2.2

Trust: 1.2

vendor:hitachimodel:cosminexus application server 05-05-/hscope: - version: -

Trust: 1.2

vendor:hitachimodel:ucosminexus developer standardscope:eqversion:07-00-06

Trust: 1.2

vendor:hitachimodel:ucosminexus application server standardscope:eqversion:07-60

Trust: 1.2

vendor:hitachimodel:jp1/cm2/network node manager starter editionscope:eqversion:25008-10-01

Trust: 1.2

vendor:hitachimodel:ucosminexus service platformscope:eqversion:07-00-06

Trust: 1.2

vendor:hitachimodel:ucosminexus application server enterprise 06-70-/gscope: - version: -

Trust: 1.2

vendor:hitachimodel:ucosminexus application server standardscope:eqversion:07-00-06

Trust: 1.2

vendor:hitachimodel:cosminexus application server 05-05-/fscope: - version: -

Trust: 1.2

vendor:hitachimodel:cosminexus application server standard 06-50-/dscope: - version: -

Trust: 1.2

vendor:hitachimodel:ucosminexus application server standardscope:eqversion:08-00

Trust: 1.2

vendor:hitachimodel:cosminexus application server 05-05-/ascope: - version: -

Trust: 1.2

vendor:hitachimodel:cosminexus application server 05-05-/escope: - version: -

Trust: 1.2

vendor:hitachimodel:ucosminexus application server enterprisescope:eqversion:07-00-06

Trust: 1.2

vendor:hitachimodel:ucosminexus developer professionalscope:eqversion:07-00-06

Trust: 1.2

vendor:hitachimodel:ucosminexus application server enterprisescope:eqversion:07-60

Trust: 1.2

vendor:hitachimodel:cosminexus application server 05-05-/gscope: - version: -

Trust: 1.2

vendor:hitachimodel:ucosminexus operatorscope:eqversion:07-00-06

Trust: 1.2

vendor:sunmodel:jre 014scope:eqversion:1.2.2

Trust: 1.2

vendor:hitachimodel:ucosminexus service architectscope:eqversion:07-00-06

Trust: 1.2

vendor:sunmodel:jrescope:eqversion:1.2.2

Trust: 1.2

vendor:hitachimodel:cosminexus application server 05-05-/bscope: - version: -

Trust: 1.2

vendor:hitachimodel:cosminexus application server 05-05-/cscope: - version: -

Trust: 1.2

vendor:hitachimodel:cosminexus application server enterprise 06-50-/dscope: - version: -

Trust: 1.2

vendor:hitachimodel:ucosminexus application server enterprisescope:eqversion:08-00

Trust: 1.2

vendor:hitachimodel:ucosminexus application server standardscope:eqversion:07-00

Trust: 1.2

vendor:vmwaremodel:esxscope:eqversion:4.0

Trust: 1.1

vendor:vmwaremodel:esxscope:eqversion:4.1

Trust: 1.1

vendor:vmwaremodel:esxscope:eqversion:3.5

Trust: 1.1

vendor:sunmodel:jrescope:eqversion:1.4.2_25

Trust: 1.0

vendor:sunmodel:sdkscope:lteversion:1.4.2_29

Trust: 1.0

vendor:sunmodel:jrescope:eqversion:1.4.2_2

Trust: 1.0

vendor:sunmodel:jrescope:eqversion:1.4.2_3

Trust: 1.0

vendor:sunmodel:jrescope:eqversion:1.4.2_22

Trust: 1.0

vendor:sunmodel:jrescope:eqversion:1.4.2_23

Trust: 1.0

vendor:sunmodel:jdkscope:eqversion:1.5.0

Trust: 1.0

vendor:sunmodel:jdkscope:lteversion:1.6.0

Trust: 1.0

vendor:sunmodel:sdkscope:eqversion:1.4.2_5

Trust: 1.0

vendor:sunmodel:sdkscope:eqversion:1.4.2_24

Trust: 1.0

vendor:sunmodel:jrescope:lteversion:1.5.0

Trust: 1.0

vendor:sunmodel:jrescope:eqversion:1.4.2_13

Trust: 1.0

vendor:sunmodel:jrescope:eqversion:1.4.2_15

Trust: 1.0

vendor:sunmodel:sdkscope:eqversion:1.4.2_18

Trust: 1.0

vendor:sunmodel:jrescope:eqversion:1.4.2_10

Trust: 1.0

vendor:sunmodel:sdkscope:eqversion:1.4.2_1

Trust: 1.0

vendor:sunmodel:sdkscope:eqversion:1.4.2_8

Trust: 1.0

vendor:sunmodel:jrescope:eqversion:1.4.2_19

Trust: 1.0

vendor:sunmodel:sdkscope:eqversion:1.4.2_16

Trust: 1.0

vendor:sunmodel:sdkscope:eqversion:1.4.2_4

Trust: 1.0

vendor:sunmodel:jrescope:eqversion:1.4.2_6

Trust: 1.0

vendor:sunmodel:jrescope:eqversion:1.4.2_26

Trust: 1.0

vendor:sunmodel:jrescope:eqversion:1.4.2_21

Trust: 1.0

vendor:sunmodel:sdkscope:eqversion:1.4.2_7

Trust: 1.0

vendor:sunmodel:sdkscope:eqversion:1.4.2_17

Trust: 1.0

vendor:sunmodel:sdkscope:eqversion:1.4.2_25

Trust: 1.0

vendor:sunmodel:sdkscope:eqversion:1.4.2_3

Trust: 1.0

vendor:sunmodel:sdkscope:eqversion:1.4.2_11

Trust: 1.0

vendor:sunmodel:sdkscope:eqversion:1.4.2_12

Trust: 1.0

vendor:sunmodel:sdkscope:eqversion:1.4.2_22

Trust: 1.0

vendor:sunmodel:jrescope:eqversion:1.4.2_9

Trust: 1.0

vendor:sunmodel:jrescope:eqversion:1.4.2_27

Trust: 1.0

vendor:sunmodel:jrescope:eqversion:1.4.2_28

Trust: 1.0

vendor:sunmodel:jdkscope:lteversion:1.5.0

Trust: 1.0

vendor:sunmodel:jrescope:eqversion:1.6.0

Trust: 1.0

vendor:sunmodel:sdkscope:eqversion:1.4.2_23

Trust: 1.0

vendor:sunmodel:jrescope:lteversion:1.4.2_29

Trust: 1.0

vendor:sunmodel:jrescope:eqversion:1.4.2_14

Trust: 1.0

vendor:sunmodel:sdkscope:eqversion:1.4.2_13

Trust: 1.0

vendor:sunmodel:sdkscope:eqversion:1.4.2_10

Trust: 1.0

vendor:sunmodel:sdkscope:eqversion:1.4.2_15

Trust: 1.0

vendor:sunmodel:jrescope:eqversion:1.4.2_8

Trust: 1.0

vendor:sunmodel:jrescope:eqversion:1.4.2_20

Trust: 1.0

vendor:sunmodel:sdkscope:eqversion:1.4.2_6

Trust: 1.0

vendor:sunmodel:sdkscope:eqversion:1.4.2_26

Trust: 1.0

vendor:sunmodel:sdkscope:eqversion:1.4.2_19

Trust: 1.0

vendor:sunmodel:jdkscope:eqversion:1.6.0

Trust: 1.0

vendor:sunmodel:sdkscope:eqversion:1.4.2_21

Trust: 1.0

vendor:sunmodel:jrescope:eqversion:1.4.2_5

Trust: 1.0

vendor:sunmodel:jrescope:eqversion:1.4.2_24

Trust: 1.0

vendor:sunmodel:jrescope:lteversion:1.6.0

Trust: 1.0

vendor:sunmodel:sdkscope:eqversion:1.4.2_9

Trust: 1.0

vendor:sunmodel:sdkscope:eqversion:1.4.2_02

Trust: 1.0

vendor:sunmodel:sdkscope:eqversion:1.4.2_27

Trust: 1.0

vendor:sunmodel:jrescope:eqversion:1.4.2_1

Trust: 1.0

vendor:sunmodel:jrescope:eqversion:1.4.2_16

Trust: 1.0

vendor:sunmodel:jrescope:eqversion:1.4.2_4

Trust: 1.0

vendor:sunmodel:jrescope:eqversion:1.4.2_18

Trust: 1.0

vendor:sunmodel:sdkscope:eqversion:1.4.2_28

Trust: 1.0

vendor:sunmodel:sdkscope:eqversion:1.4.2_14

Trust: 1.0

vendor:sunmodel:jrescope:eqversion:1.4.2_7

Trust: 1.0

vendor:sunmodel:jrescope:eqversion:1.4.2_12

Trust: 1.0

vendor:sunmodel:jrescope:eqversion:1.4.2_11

Trust: 1.0

vendor:sunmodel:sdkscope:eqversion:1.4.2_20

Trust: 1.0

vendor:sunmodel:jrescope:eqversion:1.4.2_17

Trust: 1.0

vendor:sunmodel:jre 17scope:eqversion:1.6

Trust: 0.9

vendor:sunmodel:sdk 08scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jre 1.3.1 22scope: - version: -

Trust: 0.9

vendor:hitachimodel:jp1/cm2/network node manager starter ed enterprisescope:eqversion:08-00-02

Trust: 0.9

vendor:sunmodel:jdk 14scope:eqversion:1.3.1

Trust: 0.9

vendor:hitachimodel:cosminexus application server enterprise )scope:eqversion:06-00

Trust: 0.9

vendor:sunmodel:jdk 1.5.0 16scope: - version: -

Trust: 0.9

vendor:sunmodel:jdk 05scope:eqversion:1.6

Trust: 0.9

vendor:sunmodel:sdk 10scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jdk 14scope:eqversion:1.6

Trust: 0.9

vendor:sunmodel:jrescope:eqversion:1.5

Trust: 0.9

vendor:sunmodel:jrescope:eqversion:1.1.8

Trust: 0.9

vendor:sunmodel:sdk 1.4.2 25scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.4.2 25scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 06scope:eqversion:1.5

Trust: 0.9

vendor:sunmodel:jre 04scope:eqversion:1.3.1

Trust: 0.9

vendor:hitachimodel:ucosminexus application server enterprise 06-71-/bscope: - version: -

Trust: 0.9

vendor:sunmodel:jre 015scope:eqversion:1.2.2

Trust: 0.9

vendor:sunmodel:jre 01scope:eqversion:1.4.1

Trust: 0.9

vendor:hitachimodel:cosminexus application server standard 06-02-/ascope: - version: -

Trust: 0.9

vendor:sunmodel:jre 10scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:jre 05scope:eqversion:1.5

Trust: 0.9

vendor:sunmodel:jdk 1.6.0 03scope: - version: -

Trust: 0.9

vendor:sunmodel:sdk 1.4.2 11scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 10scope:eqversion:1.6

Trust: 0.9

vendor:hitachimodel:cosminexus application server standard 06-51-/ascope: - version: -

Trust: 0.9

vendor:sunmodel:jre 14scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:sdk 03scope:eqversion:1.4.1

Trust: 0.9

vendor:sunmodel:jre 04scope:eqversion:1.2.1

Trust: 0.9

vendor:sunmodel:jdkscope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jre 01scope:eqversion:1.5

Trust: 0.9

vendor:sunmodel:jdk 09scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jre 27scope:eqversion:1.3.1

Trust: 0.9

vendor:hitachimodel:ucosminexus service architectscope:eqversion:07-00-03

Trust: 0.9

vendor:sunmodel:jre 1.5.0 11scope: - version: -

Trust: 0.9

vendor:sunmodel:jdk 06scope:eqversion:1.4.2

Trust: 0.9

vendor:hitachimodel:cosminexus application server enterprise 06-02-/dscope: - version: -

Trust: 0.9

vendor:sunmodel:jdk 007scope:eqversion:1.1.6

Trust: 0.9

vendor:sunmodel:jre 1.4.2 12scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 09scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jdk 14scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jdkscope:eqversion:1.2

Trust: 0.9

vendor:sunmodel:sdk 24scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jre 02scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jre 01ascope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:jrescope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:jre 07scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jre 1.4.2 22scope: - version: -

Trust: 0.9

vendor:sunmodel:jrescope:eqversion:1.6

Trust: 0.9

vendor:oraclemodel:jre 1.6.0 23scope: - version: -

Trust: 0.9

vendor:sunmodel:sdk 1.4.2 27scope: - version: -

Trust: 0.9

vendor:sunmodel:sdk 15scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:sdk 07scope:eqversion:1.4.2

Trust: 0.9

vendor:hitachimodel:ucosminexus service platformscope:eqversion:07-60

Trust: 0.9

vendor:sunmodel:jre .0 04scope:eqversion:1.4

Trust: 0.9

vendor:hitachimodel:processing kit for xmlscope:eqversion:01-05

Trust: 0.9

vendor:sunmodel:jdk 1.5.0 25scope: - version: -

Trust: 0.9

vendor:hitachimodel:cosminexus application server enterprise 06-02-/cscope: - version: -

Trust: 0.9

vendor:sunmodel:jrescope:eqversion:1.4

Trust: 0.9

vendor:sunmodel:jre 07scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:jre 07scope:eqversion:1.6

Trust: 0.9

vendor:sunmodel:jre 11scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:jre 03scope:eqversion:1.4.1

Trust: 0.9

vendor:sunmodel:jre 1.6.0 11scope: - version: -

Trust: 0.9

vendor:sunmodel:sdk 02scope:eqversion:1.4.1

Trust: 0.9

vendor:sunmodel:jre 01scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jre 04scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jdkscope:eqversion:1.6

Trust: 0.9

vendor:sunmodel:jre .0 02scope:eqversion:1.3

Trust: 0.9

vendor:hitachimodel:ucosminexus application server enterprisescope:eqversion:07-50-01

Trust: 0.9

vendor:sunmodel:jre 1.5.0 17scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.4.2 17scope: - version: -

Trust: 0.9

vendor:sunmodel:jdk 01scope:eqversion:1.4.1

Trust: 0.9

vendor:sunmodel:jre 24scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jre 1.5.0 27scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.3.1 23scope: - version: -

Trust: 0.9

vendor:sunmodel:jdk b 005scope:eqversion:1.1.7

Trust: 0.9

vendor:sunmodel:jre 1.6.0 03scope: - version: -

Trust: 0.9

vendor:hitachimodel:processing kit for xml 02-05-/ascope: - version: -

Trust: 0.9

vendor:sunmodel:jdk 01scope:eqversion:1.5

Trust: 0.9

vendor:hitachimodel:cosminexus application server standard )scope:eqversion:06-00

Trust: 0.9

vendor:hitachimodel:cosminexus application server enterprise 06-50-/fscope: - version: -

Trust: 0.9

vendor:sunmodel:sdk 06scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jre 08scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jdk 10scope:eqversion:1.6

Trust: 0.9

vendor:hitachimodel:cosminexus application server enterprise 06-51-/ascope: - version: -

Trust: 0.9

vendor:hitachimodel:ucosminexus application server enterprise 06-71-/cscope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.4.2 13scope: - version: -

Trust: 0.9

vendor:sunmodel:jdk 02scope:eqversion:1.5

Trust: 0.9

vendor:sunmodel:jdk 1.5.0 23scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 04scope:eqversion:1.5

Trust: 0.9

vendor:sunmodel:jre 06scope:eqversion:1.1.8

Trust: 0.9

vendor:sunmodel:jre 1.3.1 25scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 05scope:eqversion:1.6

Trust: 0.9

vendor:sunmodel:jre 02scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:jdk 1.5.0 26scope: - version: -

Trust: 0.9

vendor:hitachimodel:jp1/cm2/network node manager starter ed enterprisescope:eqversion:08-10-01

Trust: 0.9

vendor:sunmodel:sdk 1.4.2 16scope: - version: -

Trust: 0.9

vendor:hitachimodel:processing kit for xml 02-05-/bscope: - version: -

Trust: 0.9

vendor:hitachimodel:ucosminexus service platformscope:eqversion:07-50

Trust: 0.9

vendor:hitachimodel:ucosminexus service platformscope:eqversion:07-10

Trust: 0.9

vendor:sunmodel:jre 16scope:eqversion:1.5

Trust: 0.9

vendor:sunmodel:jre 1.5.0 20scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.3.1 26scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 18scope:eqversion:1.5

Trust: 0.9

vendor:sunmodel:jre 01scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:jdk 11scope:eqversion:1.6

Trust: 0.9

vendor:sunmodel:jre .0 03scope:eqversion:1.4

Trust: 0.9

vendor:sunmodel:sdk .0 03scope:eqversion:1.4

Trust: 0.9

vendor:sunmodel:jre 1.4.2 11scope: - version: -

Trust: 0.9

vendor:sunmodel:jdkscope:eqversion:1.1

Trust: 0.9

vendor:hitachimodel:cosminexus application server standard 06-02-/dscope: - version: -

Trust: 0.9

vendor:sunmodel:jdk 0 10scope:eqversion:1.5

Trust: 0.9

vendor:sunmodel:jre 1.5.0 10scope: - version: -

Trust: 0.9

vendor:hitachimodel:cosminexus application server enterprise 06-02-/ascope: - version: -

Trust: 0.9

vendor:sunmodel:jdk 1.5.0 27scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 03scope:eqversion:1.5

Trust: 0.9

vendor:sunmodel:sdk 1.4.2 29scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 02scope:eqversion:1.4.1

Trust: 0.9

vendor:sunmodel:sdk 1.4.2 14scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.5.0 14scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.4.2 20scope: - version: -

Trust: 0.9

vendor:hitachimodel:ucosminexus application server standard )scope:eqversion:06-70

Trust: 0.9

vendor:sunmodel:jdk 1.5.0 24scope: - version: -

Trust: 0.9

vendor:sunmodel:jdk 18scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:jre 1.5.0 25scope: - version: -

Trust: 0.9

vendor:sunmodel:jdk .0 05scope:eqversion:1.5

Trust: 0.9

vendor:sunmodel:jre 06scope:eqversion:1.3.1

Trust: 0.9

vendor:hitachimodel:ucosminexus service platformscope:eqversion:07-00-03

Trust: 0.9

vendor:sunmodel:jre 06scope:eqversion:1.6

Trust: 0.9

vendor:hitachimodel:cosminexus application server standard 06-02-/cscope: - version: -

Trust: 0.9

vendor:sunmodel:jdk 1.5.0 13scope: - version: -

Trust: 0.9

vendor:hitachimodel:jp1/cm2/network node managerscope:eqversion:07-10

Trust: 0.9

vendor:sunmodel:jre 1.4.2 16scope: - version: -

Trust: 0.9

vendor:sunmodel:sdk 1.4.2 17scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.6.0 15scope: - version: -

Trust: 0.9

vendor:hitachimodel:cosminexus application serverscope:eqversion:05-00

Trust: 0.9

vendor:sunmodel:jrescope:eqversion:1.4.1

Trust: 0.9

vendor:sunmodel:jre 03scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:jre 1.6.0 21scope: - version: -

Trust: 0.9

vendor:sunmodel:jdk 15scope:eqversion:1.5

Trust: 0.9

vendor:sunmodel:jre 10scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jre 1.6.0 18scope: - version: -

Trust: 0.9

vendor:sunmodel:sdkscope:eqversion:1.4.1

Trust: 0.9

vendor:oraclemodel:jre 1.6.0 22scope: - version: -

Trust: 0.9

vendor:hitachimodel:jp1/cm2/network node manager starter editionscope:eqversion:25008-00-02

Trust: 0.9

vendor:sunmodel:jdk 07scope:eqversion:1.4.1

Trust: 0.9

vendor:sunmodel:sdk .0 4scope:eqversion:1.4

Trust: 0.9

vendor:sunmodel:sdk 1.4.2 28scope: - version: -

Trust: 0.9

vendor:sunmodel:jdk 1.6.0 21scope: - version: -

Trust: 0.9

vendor:hitachimodel:cosminexus application server standard 06-02-/bscope: - version: -

Trust: 0.9

vendor:sunmodel:jdk 1.6.0 15scope: - version: -

Trust: 0.9

vendor:sunmodel:jdk 01scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:sdk .0 02scope:eqversion:1.4

Trust: 0.9

vendor:sunmodel:sdk 1.4.2 12scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.4.2 18scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.4.2 14scope: - version: -

Trust: 0.9

vendor:hitachimodel:processing kit for xmlscope:eqversion:02-00

Trust: 0.9

vendor:sunmodel:jre 1.6.0 02scope: - version: -

Trust: 0.9

vendor:hitachimodel:cosminexus application server standard 06-50-/fscope: - version: -

Trust: 0.9

vendor:sunmodel:jrescope:eqversion:1.2.1

Trust: 0.9

vendor:sunmodel:jre 06scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jre 1.4.2 15scope: - version: -

Trust: 0.9

vendor:hitachimodel:cosminexus application server enterprise 06-02-/bscope: - version: -

Trust: 0.9

vendor:sunmodel:jre 15scope:eqversion:1.5

Trust: 0.9

vendor:sunmodel:jdk 17scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:sdk 1.4.2 26scope: - version: -

Trust: 0.9

vendor:hitachimodel:jp1/cm2/network node manager starter ed enterprisescope:eqversion:08-00-01

Trust: 0.9

vendor:sunmodel:jre 1.4.2 29scope: - version: -

Trust: 0.9

vendor:sunmodel:sdk 01scope:eqversion:1.4.1

Trust: 0.9

vendor:sunmodel:jdk 17scope:eqversion:1.6

Trust: 0.9

vendor:hitachimodel:ucosminexus clientscope:eqversion:07-00-03

Trust: 0.9

vendor:sunmodel:jre .0 02scope:eqversion:1.4

Trust: 0.9

vendor:sunmodel:jre 13scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:sdk 09scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jre 13scope:eqversion:1.6

Trust: 0.9

vendor:sunmodel:jdk 05scope:eqversion:1.4.2

Trust: 0.9

vendor:hitachimodel:cosminexus application server 05-05-/mscope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.5.0 26scope: - version: -

Trust: 0.9

vendor:sunmodel:sdk 1.4.2 18scope: - version: -

Trust: 0.9

vendor:hitachimodel:cosminexus server web editionscope:eqversion:-04-01

Trust: 0.9

vendor:sunmodel:jdk 008scope:eqversion:1.1.8

Trust: 0.9

vendor:sunmodel:jdk 08scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jre 05scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jre 1.3.1 20scope: - version: -

Trust: 0.9

vendor:sunmodel:jdk 17scope:eqversion:1.5

Trust: 0.9

vendor:sunmodel:jdk 18scope:eqversion:1.5

Trust: 0.9

vendor:sunmodel:sdk 1.4.2 22scope: - version: -

Trust: 0.9

vendor:oraclemodel:jdkscope:eqversion:1.7

Trust: 0.9

vendor:hitachimodel:ucosminexus application server standardscope:eqversion:07-00-01

Trust: 0.9

vendor:sunmodel:jre 08scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:jrescope:eqversion:1.2

Trust: 0.9

vendor:sunmodel:jdk 1.6.0 02scope: - version: -

Trust: 0.9

vendor:sunmodel:sdk 04scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jre 12scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:jre 1.6.0 01scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 12scope:eqversion:1.6

Trust: 0.9

vendor:hitachimodel:ucosminexus operatorscope:eqversion:07-00-03

Trust: 0.9

vendor:sunmodel:jdk 07scope:eqversion:1.6

Trust: 0.9

vendor:sunmodel:sdk 05scope:eqversion:1.4.2

Trust: 0.9

vendor:hitachimodel:ucosminexus application server standardscope:eqversion:07-50

Trust: 0.9

vendor:hitachimodel:ucosminexus application server enterprise )scope:eqversion:06-70

Trust: 0.9

vendor:sunmodel:jdk 14scope:eqversion:1.5

Trust: 0.9

vendor:sunmodel:jre 02scope:eqversion:1.5

Trust: 0.9

vendor:sunmodel:sdk 03scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jre 03scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jre 1.3.1 21scope: - version: -

Trust: 0.9

vendor:sunmodel:sdk 1.4.2 19scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.5.0 12scope: - version: -

Trust: 0.9

vendor:sunmodel:sdkscope:eqversion:1.4

Trust: 0.9

vendor:sunmodel:jdk 13scope:eqversion:1.6

Trust: 0.9

vendor:sunmodel:jre 1.5.0 13scope: - version: -

Trust: 0.9

vendor:sunmodel:jdk 22scope:eqversion:1.5

Trust: 0.9

vendor:sunmodel:jre 1.4.2 19scope: - version: -

Trust: 0.9

vendor:sunmodel:jre .0 05scope:eqversion:1.3

Trust: 0.9

vendor:sunmodel:jre 05scope:eqversion:1.3.1

Trust: 0.9

vendor:oraclemodel:jdk 1.6.0 23scope: - version: -

Trust: 0.9

vendor:sunmodel:sdk 1.4.2 20scope: - version: -

Trust: 0.9

vendor:sunmodel:jdk 1.6.0 20scope: - version: -

Trust: 0.9

vendor:sunmodel:jdk 04scope:eqversion:1.6

Trust: 0.9

vendor:sunmodel:jre 04scope:eqversion:1.6

Trust: 0.9

vendor:sunmodel:jre 1.6.0 19scope: - version: -

Trust: 0.9

vendor:hitachimodel:ucosminexus application server enterprisescope:eqversion:07-50

Trust: 0.9

vendor:sunmodel:jdk 1.5.0 20scope: - version: -

Trust: 0.9

vendor:sunmodel:jdkscope:eqversion:1.4.1

Trust: 0.9

vendor:sunmodel:jre 1.5.0 23scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 09scope:eqversion:1.3.1

Trust: 0.9

vendor:hitachimodel:cosminexus application server standard 06-51-/bscope: - version: -

Trust: 0.9

vendor:hitachimodel:ucosminexus application server standardscope:eqversion:07-50-01

Trust: 0.9

vendor:oraclemodel:jdk 1.6.0 22scope: - version: -

Trust: 0.9

vendor:sunmodel:sdk 1.4.2 13scope: - version: -

Trust: 0.9

vendor:sunmodel:jdk 06scope:eqversion:1.6

Trust: 0.9

vendor:sunmodel:jre 09scope:eqversion:1.1.6

Trust: 0.9

vendor:hitachimodel:ucosminexus application server enterprisescope:eqversion:07-00-01

Trust: 0.9

vendor:sunmodel:jdk 1.6.0 18scope: - version: -

Trust: 0.9

vendor:sunmodel:jdk 1.6.0 19scope: - version: -

Trust: 0.9

vendor:hitachimodel:cosminexus application server enterprise 06-51-/bscope: - version: -

Trust: 0.9

vendor:sunmodel:jre 007scope:eqversion:1.2.2

Trust: 0.9

vendor:sunmodel:jre 1.6.0 14scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 22scope:eqversion:1.5

Trust: 0.9

vendor:sunmodel:jdk 009scope:eqversion:1.1.8

Trust: 0.9

vendor:ibmmodel:websphere application serverscope:eqversion:to v6.0 to v6.0.2.43

Trust: 0.8

vendor:ibmmodel:websphere application serverscope:eqversion:to v6.1 to v6.1.0.35

Trust: 0.8

vendor:ibmmodel:websphere application serverscope:eqversion:to v7.0 to v7.0.0.13

Trust: 0.8

vendor:ibmmodel:websphere application serverscope:eqversion:v6.0 to v6.0.2.43

Trust: 0.8

vendor:ibmmodel:websphere application serverscope:eqversion:v6.1 to v6.1.0.35

Trust: 0.8

vendor:ibmmodel:websphere application serverscope:eqversion:v7.0 to v7.0.0.13

Trust: 0.8

vendor:vmwaremodel:esxscope:eqversion:3.0.3

Trust: 0.8

vendor:vmwaremodel:esxiscope: - version: -

Trust: 0.8

vendor:vmwaremodel:vcenterscope:eqversion:4.0 (windows)

Trust: 0.8

vendor:vmwaremodel:vcenterscope:eqversion:4.1 (windows)

Trust: 0.8

vendor:vmwaremodel:vcenterscope:eqversion:5.0 (windows)

Trust: 0.8

vendor:vmwaremodel:virtualcenterscope:eqversion:2.5 (windows)

Trust: 0.8

vendor:vmwaremodel:vsphere update managerscope:eqversion:4.0 (windows)

Trust: 0.8

vendor:vmwaremodel:vsphere update managerscope:eqversion:4.1 (windows)

Trust: 0.8

vendor:vmwaremodel:vsphere update managerscope:eqversion:5.0 (windows)

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:v10.5.8

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:v10.6.6

Trust: 0.8

vendor:applemodel:mac os x serverscope:eqversion:v10.5.8

Trust: 0.8

vendor:applemodel:mac os x serverscope:eqversion:v10.6.6

Trust: 0.8

vendor:oraclemodel:iplanet web serverscope:eqversion:6.1

Trust: 0.8

vendor:oraclemodel:iplanet web serverscope:eqversion:7.0

Trust: 0.8

vendor:cybertrustmodel:asianux serverscope:eqversion:3 (x86)

Trust: 0.8

vendor:cybertrustmodel:asianux serverscope:eqversion:3 (x86-64)

Trust: 0.8

vendor:sun microsystemsmodel:jdkscope:lteversion:5.0 update 27

Trust: 0.8

vendor:sun microsystemsmodel:jdkscope:lteversion:6 update 23

Trust: 0.8

vendor:sun microsystemsmodel:jrescope:lteversion:1.4.2_29

Trust: 0.8

vendor:sun microsystemsmodel:jrescope:lteversion:5.0 update 27

Trust: 0.8

vendor:sun microsystemsmodel:jrescope:lteversion:6 update 23

Trust: 0.8

vendor:sun microsystemsmodel:sdkscope:lteversion:1.4.2_29

Trust: 0.8

vendor:hewlett packardmodel:hp systems insight managerscope:ltversion:7.0

Trust: 0.8

vendor:hewlett packardmodel:hp tru64 unixscope:lteversion:running j2se v 1.42-9

Trust: 0.8

vendor:hewlett packardmodel:hp-uxscope:eqversion:11.11

Trust: 0.8

vendor:hewlett packardmodel:hp-uxscope:eqversion:11.23

Trust: 0.8

vendor:hewlett packardmodel:hp-uxscope:eqversion:11.23 (ia)

Trust: 0.8

vendor:hewlett packardmodel:hp-uxscope:eqversion:11.23 (pa)

Trust: 0.8

vendor:hewlett packardmodel:hp-uxscope:eqversion:11.31

Trust: 0.8

vendor:hewlett packardmodel:hp-ux tomcat-based servlet enginescope:eqversion:5.5.30.04

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:5 (server)

Trust: 0.8

vendor:red hatmodel:enterprise linux desktopscope:eqversion:5.0 (client)

Trust: 0.8

vendor:red hatmodel:enterprise linux desktopscope:eqversion:6

Trust: 0.8

vendor:red hatmodel:enterprise linux extrasscope:eqversion:4 extras

Trust: 0.8

vendor:red hatmodel:enterprise linux extrasscope:eqversion:4.8.z extras

Trust: 0.8

vendor:red hatmodel:enterprise linux hpc nodescope:eqversion:6

Trust: 0.8

vendor:red hatmodel:enterprise linux hpc node supplementaryscope:eqversion:6

Trust: 0.8

vendor:red hatmodel:enterprise linux serverscope:eqversion:6

Trust: 0.8

vendor:red hatmodel:enterprise linux server supplementaryscope:eqversion:6

Trust: 0.8

vendor:red hatmodel:enterprise linux workstationscope:eqversion:6

Trust: 0.8

vendor:red hatmodel:enterprise linux workstation supplementaryscope:eqversion:6

Trust: 0.8

vendor:red hatmodel:rhel desktop supplementaryscope:eqversion:5 (client)

Trust: 0.8

vendor:red hatmodel:rhel desktop supplementaryscope:eqversion:6

Trust: 0.8

vendor:red hatmodel:rhel desktop workstationscope:eqversion:5 (client)

Trust: 0.8

vendor:red hatmodel:rhel supplementaryscope:eqversion:5 (server)

Trust: 0.8

vendor:necmodel:systemdirector enterprisescope: - version: -

Trust: 0.8

vendor:hitachimodel:cosminexus application serverscope:eqversion:enterprise version 6

Trust: 0.8

vendor:hitachimodel:cosminexus application serverscope:eqversion:standard version 6

Trust: 0.8

vendor:hitachimodel:cosminexus application serverscope:eqversion:version 5

Trust: 0.8

vendor:hitachimodel:cosminexus clientscope:eqversion:version 6

Trust: 0.8

vendor:hitachimodel:cosminexus collaborationscope:eqversion:- server

Trust: 0.8

vendor:hitachimodel:cosminexus developerscope:eqversion:light version 6

Trust: 0.8

vendor:hitachimodel:cosminexus developerscope:eqversion:professional version 6

Trust: 0.8

vendor:hitachimodel:cosminexus developerscope:eqversion:standard version 6

Trust: 0.8

vendor:hitachimodel:cosminexus developerscope:eqversion:version 5

Trust: 0.8

vendor:hitachimodel:cosminexus serverscope:eqversion:- standard edition version 4

Trust: 0.8

vendor:hitachimodel:cosminexus serverscope:eqversion:- web edition version 4

Trust: 0.8

vendor:hitachimodel:cosminexus studioscope:eqversion:- standard edition version 4

Trust: 0.8

vendor:hitachimodel:cosminexus studioscope:eqversion:- web edition version 4

Trust: 0.8

vendor:hitachimodel:cosminexus studioscope:eqversion:version 5

Trust: 0.8

vendor:hitachimodel:groupmax collaborationscope:eqversion:- server

Trust: 0.8

vendor:hitachimodel:hirdb realtime monitorscope: - version: -

Trust: 0.8

vendor:hitachimodel:developer's kit for javascope: - version: -

Trust: 0.8

vendor:hitachimodel:device managerscope:eqversion:software

Trust: 0.8

vendor:hitachimodel:global link managerscope:eqversion:software

Trust: 0.8

vendor:hitachimodel:it operations analyzerscope: - version: -

Trust: 0.8

vendor:hitachimodel:it operations directorscope: - version: -

Trust: 0.8

vendor:hitachimodel:provisioning managerscope:eqversion:software

Trust: 0.8

vendor:hitachimodel:replication managerscope:eqversion:software

Trust: 0.8

vendor:hitachimodel:tiered storage managerscope:eqversion:software

Trust: 0.8

vendor:hitachimodel:tuning managerscope:eqversion:software

Trust: 0.8

vendor:hitachimodel:job management partner 1/automatic job management system 2scope:eqversion:- web operation assistant( english edition )

Trust: 0.8

vendor:hitachimodel:job management partner 1/automatic job management system 2scope:eqversion:- web operation assistant/ex( english edition )

Trust: 0.8

vendor:hitachimodel:job management partner 1/automatic job management system 3scope:eqversion:- web operation assistant( english edition )

Trust: 0.8

vendor:hitachimodel:job management partner 1/performance management - web consolescope:eqversion:( overseas edition )

Trust: 0.8

vendor:hitachimodel:jp1/automatic job management system 2scope:eqversion:- web operation assistant

Trust: 0.8

vendor:hitachimodel:jp1/automatic job management system 3scope:eqversion:- web operation assistant

Trust: 0.8

vendor:hitachimodel:jp1/cm2/network node managerscope:eqversion:none

Trust: 0.8

vendor:hitachimodel:jp1/cm2/network node managerscope:eqversion:i

Trust: 0.8

vendor:hitachimodel:jp1/cm2/network node managerscope:eqversion:i advanced

Trust: 0.8

vendor:hitachimodel:jp1/cm2/network node managerscope:eqversion:starter edition 250

Trust: 0.8

vendor:hitachimodel:jp1/cm2/network node managerscope:eqversion:starter edition enterprise

Trust: 0.8

vendor:hitachimodel:jp1/cm2/snmp system observerscope: - version: -

Trust: 0.8

vendor:hitachimodel:jp1/hicommand device managerscope: - version: -

Trust: 0.8

vendor:hitachimodel:jp1/hicommand global link availability managerscope: - version: -

Trust: 0.8

vendor:hitachimodel:jp1/hicommand provisioning managerscope: - version: -

Trust: 0.8

vendor:hitachimodel:jp1/hicommand replication monitorscope: - version: -

Trust: 0.8

vendor:hitachimodel:jp1/hicommand tiered storage managerscope: - version: -

Trust: 0.8

vendor:hitachimodel:jp1/hicommand tuning managerscope: - version: -

Trust: 0.8

vendor:hitachimodel:jp1/integrated managementscope:eqversion:- service support

Trust: 0.8

vendor:hitachimodel:jp1/it resource managementscope:eqversion:- manager

Trust: 0.8

vendor:hitachimodel:jp1/performance managementscope:eqversion:- web console

Trust: 0.8

vendor:hitachimodel:jp1/performance managementscope:eqversion:- web console( overseas edition )

Trust: 0.8

vendor:hitachimodel:jp1/serverconductor/control managerscope: - version: -

Trust: 0.8

vendor:hitachimodel:processing kit for xmlscope: - version: -

Trust: 0.8

vendor:hitachimodel:ucosminexus application serverscope:eqversion:enterprise

Trust: 0.8

vendor:hitachimodel:ucosminexus application serverscope:eqversion:standard

Trust: 0.8

vendor:hitachimodel:ucosminexus application serverscope:eqversion:standard-r

Trust: 0.8

vendor:hitachimodel:ucosminexus clientscope: - version: -

Trust: 0.8

vendor:hitachimodel:ucosminexus collaborationscope:eqversion:- server

Trust: 0.8

vendor:hitachimodel:ucosminexus developerscope:eqversion:light

Trust: 0.8

vendor:hitachimodel:ucosminexus developerscope:eqversion:professional

Trust: 0.8

vendor:hitachimodel:ucosminexus developerscope:eqversion:standard

Trust: 0.8

vendor:hitachimodel:ucosminexus navigationscope:eqversion:developer

Trust: 0.8

vendor:hitachimodel:ucosminexus navigationscope:eqversion:platform

Trust: 0.8

vendor:hitachimodel:ucosminexus navigationscope:eqversion:platform - authoring license

Trust: 0.8

vendor:hitachimodel:ucosminexus navigationscope:eqversion:platform - user license

Trust: 0.8

vendor:hitachimodel:ucosminexus operatorscope: - version: -

Trust: 0.8

vendor:hitachimodel:ucosminexus portal frameworkscope:eqversion:entry set

Trust: 0.8

vendor:hitachimodel:ucosminexus reporting basescope: - version: -

Trust: 0.8

vendor:hitachimodel:ucosminexus servicescope:eqversion:architect

Trust: 0.8

vendor:hitachimodel:ucosminexus servicescope:eqversion:platform

Trust: 0.8

vendor:hitachimodel:ucosminexus stream data platformscope:eqversion:none

Trust: 0.8

vendor:hitachimodel:ucosminexus stream data platformscope:eqversion:- application framework

Trust: 0.8

vendor:hitachimodel:electronic form workflowscope:eqversion:standard set

Trust: 0.8

vendor:hitachimodel:electronic form workflowscope:eqversion:set

Trust: 0.8

vendor:hitachimodel:electronic form workflowscope:eqversion:developer client set

Trust: 0.8

vendor:hitachimodel:electronic form workflowscope:eqversion:developer set

Trust: 0.8

vendor:hitachimodel:electronic form workflowscope:eqversion:professional library set

Trust: 0.8

vendor:fujitsumodel:internet navigware serverscope: - version: -

Trust: 0.8

vendor:fujitsumodel:interstage application development cycle managerscope: - version: -

Trust: 0.8

vendor:fujitsumodel:interstage application framework suitescope: - version: -

Trust: 0.8

vendor:fujitsumodel:interstage application serverscope: - version: -

Trust: 0.8

vendor:fujitsumodel:interstage apworksscope:eqversion:server operation package

Trust: 0.8

vendor:fujitsumodel:interstage business application serverscope: - version: -

Trust: 0.8

vendor:fujitsumodel:interstage job workload serverscope: - version: -

Trust: 0.8

vendor:fujitsumodel:interstage list worksscope: - version: -

Trust: 0.8

vendor:fujitsumodel:interstage service integratorscope: - version: -

Trust: 0.8

vendor:fujitsumodel:interstage web serverscope: - version: -

Trust: 0.8

vendor:fujitsumodel:interstage xml business activity recorderscope: - version: -

Trust: 0.8

vendor:fujitsumodel:systemwalker availability viewscope: - version: -

Trust: 0.8

vendor:fujitsumodel:systemwalker centric managerscope: - version: -

Trust: 0.8

vendor:fujitsumodel:systemwalker it change managerscope: - version: -

Trust: 0.8

vendor:fujitsumodel:systemwalker it process masterscope: - version: -

Trust: 0.8

vendor:fujitsumodel:systemwalker resource coordinatorscope: - version: -

Trust: 0.8

vendor:fujitsumodel:systemwalker service quality coordinatorscope: - version: -

Trust: 0.8

vendor:sun microsystemsmodel:jdkscope: - version: -

Trust: 0.8

vendor:sun microsystemsmodel:jrescope: - version: -

Trust: 0.8

vendor:sun microsystemsmodel:sdkscope: - version: -

Trust: 0.8

vendor:sunmodel:jre 005scope:eqversion:1.2.2

Trust: 0.6

vendor:hitachimodel:ucosminexus application server enterprise 06-71-/dscope: - version: -

Trust: 0.6

vendor:hitachimodel:ucosminexus application server standard 06-71-/bscope: - version: -

Trust: 0.6

vendor:hitachimodel:device manager softwarescope:eqversion:6.1.1-03

Trust: 0.6

vendor:hitachimodel:ucosminexus service platformscope:eqversion:07-03-02

Trust: 0.6

vendor:hitachimodel:tiered storage manager softwarescope:eqversion:6.1.1-00

Trust: 0.6

vendor:hitachimodel:device manager softwarescope:eqversion:6.2-01

Trust: 0.6

vendor:hitachimodel:ucosminexus application server enterprise )scope:eqversion:07-60

Trust: 0.6

vendor:hitachimodel:ucosminexus application server standard )scope:eqversion:07-10

Trust: 0.6

vendor:hitachimodel:device manager software )scope:eqversion:6.1.1-00

Trust: 0.6

vendor:hitachimodel:cosminexus application server enterprise )scope:eqversion:06-51

Trust: 0.6

vendor:sunmodel:jre .0 01scope:eqversion:1.4

Trust: 0.6

vendor:hitachimodel:jp1/integrated management service supportscope:eqversion:-08-50-04

Trust: 0.6

vendor:hitachimodel:cosminexus application server 05-00-/iscope: - version: -

Trust: 0.6

vendor:sunmodel:jdk 01-b06scope:eqversion:1.6

Trust: 0.6

vendor:hitachimodel:tiered storage manager softwarescope:eqversion:6.2-00

Trust: 0.6

vendor:hitachimodel:jp1/integrated management service supportscope:eqversion:-08-11

Trust: 0.6

vendor:sunmodel:jdk 003scope:eqversion:1.2.1

Trust: 0.6

vendor:hitachimodel:ucosminexus application server standard 06-72-/bscope: - version: -

Trust: 0.6

vendor:hitachimodel:ucosminexus service architectscope:eqversion:08-00-02

Trust: 0.6

vendor:hitachimodel:device manager software )scope:eqversion:6.1.1-04

Trust: 0.6

vendor:hitachimodel:ucosminexus application server enterprise 06-70-/nscope: - version: -

Trust: 0.6

vendor:hitachimodel:jp1/integrated management service supportscope:eqversion:-08-10-05

Trust: 0.6

vendor:hitachimodel:tiered storage manager software )scope:eqversion:6.1.1-01

Trust: 0.6

vendor:sunmodel:jre 12scope:eqversion:1.4.2

Trust: 0.6

vendor:hitachimodel:ucosminexus service platformscope:eqversion:08-00

Trust: 0.6

vendor:hitachimodel:cosminexus application server enterprise 06-00-/fscope: - version: -

Trust: 0.6

vendor:hitachimodel:jp1/cm2/network node manager starter ed enterprisescope:eqversion:08-10

Trust: 0.6

vendor:sunmodel:jdkscope:eqversion:1.1.8

Trust: 0.6

vendor:hitachimodel:device manager softwarescope:eqversion:6.0-06

Trust: 0.6

vendor:hitachimodel:cosminexus application server 05-00-/ascope: - version: -

Trust: 0.6

vendor:sunmodel:jre 1.5.0.0 09scope: - version: -

Trust: 0.6

vendor:hitachimodel:device manager softwarescope:eqversion:6.0-00

Trust: 0.6

vendor:hitachimodel:ucosminexus service platformscope:eqversion:07-00

Trust: 0.6

vendor:hitachimodel:ucosminexus application server standard 06-71-/gscope: - version: -

Trust: 0.6

vendor:hitachimodel:jp1/integrated management service supportscope:eqversion:-08-11-03

Trust: 0.6

vendor:hitachimodel:jp1/cm2/network node manager starter editionscope:eqversion:25008-00

Trust: 0.6

vendor:hitachimodel:ucosminexus application server enterprise 06-71-/hscope: - version: -

Trust: 0.6

vendor:hitachimodel:jp1/integrated management service supportscope:eqversion:-08-50-03

Trust: 0.6

vendor:hitachimodel:ucosminexus application server standard 06-71-/cscope: - version: -

Trust: 0.6

vendor:hitachimodel:ucosminexus application server standard 06-71-/ascope: - version: -

Trust: 0.6

vendor:hitachimodel:tiered storage manager softwarescope:eqversion:6.2-01

Trust: 0.6

vendor:sunmodel:jdk 06scope:eqversion:1.2.2

Trust: 0.6

vendor:hitachimodel:ucosminexus application server enterprise )scope:eqversion:07-10

Trust: 0.6

vendor:hitachimodel:device manager software )scope:eqversion:6.1-02

Trust: 0.6

vendor:hitachimodel:device manager softwarescope:eqversion:6.1.1-04

Trust: 0.6

vendor:hitachimodel:cosminexus application server 05-05-/lscope: - version: -

Trust: 0.6

vendor:hitachimodel:cosminexus application server standard )scope:eqversion:06-51

Trust: 0.6

vendor:sunmodel:jre 1.4.2 28scope: - version: -

Trust: 0.6

vendor:hitachimodel:device manager software )scope:eqversion:6.2-01

Trust: 0.6

vendor:hitachimodel:cosminexus application server 05-00-/bscope: - version: -

Trust: 0.6

vendor:hitachimodel:ucosminexus application server standard 06-71-/hscope: - version: -

Trust: 0.6

vendor:hitachimodel:processing kit for xml 01-05-/cscope: - version: -

Trust: 0.6

vendor:sunmodel:jre 007scope:eqversion:1.1.8

Trust: 0.6

vendor:sunmodel:jre 1.3.1 16scope: - version: -

Trust: 0.6

vendor:hitachimodel:ucosminexus service architectscope:eqversion:07-00-09

Trust: 0.6

vendor:sunmodel:jdk .0 04scope:eqversion:1.5

Trust: 0.6

vendor:hitachimodel:ucosminexus developer standardscope:eqversion:07-00-09

Trust: 0.6

vendor:hitachimodel:ucosminexus developer professionalscope:eqversion:07-00-10

Trust: 0.6

vendor:hitachimodel:ucosminexus application server standard )scope:eqversion:08-00

Trust: 0.6

vendor:sunmodel:jre 1.3.1 28scope: - version: -

Trust: 0.6

vendor:hitachimodel:ucosminexus operatorscope:eqversion:07-00-10

Trust: 0.6

vendor:hitachimodel:cosminexus application server 05-05-/jscope: - version: -

Trust: 0.6

vendor:sunmodel:jdk 005scope:eqversion:1.1.8

Trust: 0.6

vendor:hitachimodel:cosminexus application server enterprise 06-51-/escope: - version: -

Trust: 0.6

vendor:hitachimodel:ucosminexus operatorscope:eqversion:07-03-02

Trust: 0.6

vendor:hitachimodel:ucosminexus service architectscope:eqversion:07-03-02

Trust: 0.6

vendor:sunmodel:jrescope:eqversion:1.3

Trust: 0.6

vendor:hitachimodel:cosminexus application server standardscope:eqversion:06-51

Trust: 0.6

vendor:hitachimodel:ucosminexus application server enterprisescope:eqversion:08-00-02

Trust: 0.6

vendor:hitachimodel:replication manager software )scope:eqversion:6.2-00

Trust: 0.6

vendor:hitachimodel:ucosminexus service platformscope:eqversion:07-10-01

Trust: 0.6

vendor:hitachimodel:cosminexus application server 05-00-/cscope: - version: -

Trust: 0.6

vendor:hitachimodel:ucosminexus service platformscope:eqversion:07-00-09

Trust: 0.6

vendor:sunmodel:jre 1.3.1 15scope: - version: -

Trust: 0.6

vendor:hitachimodel:replication manager software )scope:neversion:7.3-00

Trust: 0.6

vendor:hitachimodel:ucosminexus application server standard 06-70-/nscope: - version: -

Trust: 0.6

vendor:hitachimodel:device manager softwarescope:eqversion:6.1.1-00

Trust: 0.6

vendor:hitachimodel:ucosminexus application server standard 06-72-/dscope: - version: -

Trust: 0.6

vendor:hitachimodel:device manager softwarescope:eqversion:6.2-02

Trust: 0.6

vendor:hitachimodel:cosminexus application server standard 06-51-/dscope: - version: -

Trust: 0.6

vendor:sunmodel:jdk 1.5.0.0 08scope: - version: -

Trust: 0.6

vendor:sunmodel:jre .0 04scope:eqversion:1.3

Trust: 0.6

vendor:hitachimodel:ucosminexus service architectscope:eqversion:07-00-10

Trust: 0.6

vendor:hitachimodel:ucosminexus application server standardscope:eqversion:06-71

Trust: 0.6

vendor:hitachimodel:ucosminexus developer standardscope:eqversion:07-00-10

Trust: 0.6

vendor:hitachimodel:device manager software )scope:eqversion:6.1-00

Trust: 0.6

vendor:hitachimodel:cosminexus application server standardscope:eqversion:06-02

Trust: 0.6

vendor:sunmodel:jdk 006scope:eqversion:1.2.2

Trust: 0.6

vendor:hitachimodel:processing kit for xml 02-00-/dscope: - version: -

Trust: 0.6

vendor:hitachimodel:device manager softwarescope:eqversion:6.2-00

Trust: 0.6

vendor:hitachimodel:ucosminexus service platform )scope:eqversion:08-00

Trust: 0.6

vendor:hitachimodel:jp1/integrated management service supportscope:eqversion:-08-51

Trust: 0.6

vendor:hitachimodel:processing kit for xml )scope:eqversion:02-05

Trust: 0.6

vendor:hitachimodel:jp1/cm2/snmp system observerscope:eqversion:09-00

Trust: 0.6

vendor:sunmodel:jdk 05scope:eqversion:1.2.2

Trust: 0.6

vendor:hitachimodel:cosminexus application server enterprise 06-51-/cscope: - version: -

Trust: 0.6

vendor:sunmodel:jdk 007scope:eqversion:1.1.8

Trust: 0.6

vendor:hitachimodel:device manager softwarescope:eqversion:6.1-02

Trust: 0.6

vendor:hitachimodel:ucosminexus application server standard 06-70-/hscope: - version: -

Trust: 0.6

vendor:hitachimodel:cosminexus application server enterprisescope:eqversion:06-02

Trust: 0.6

vendor:sunmodel:jre b 07scope:eqversion:1.1.7

Trust: 0.6

vendor:sunmodel:jdk .0 03scope:eqversion:1.5

Trust: 0.6

vendor:sunmodel:jdk 1.5.0 12scope: - version: -

Trust: 0.6

vendor:hitachimodel:replication manager software )scope:eqversion:6.1-01

Trust: 0.6

vendor:hitachimodel:ucosminexus application server enterprise 06-71-/gscope: - version: -

Trust: 0.6

vendor:hitachimodel:cosminexus application server standard 06-00-/iscope: - version: -

Trust: 0.6

vendor:hitachimodel:replication manager software )scope:eqversion:6.1-00

Trust: 0.6

vendor:hitachimodel:ucosminexus clientscope:eqversion:08-00-02

Trust: 0.6

vendor:sunmodel:jdk 10scope:eqversion:1.4.2

Trust: 0.6

vendor:sunmodel:jre 1.3.1 17scope: - version: -

Trust: 0.6

vendor:sunmodel:jre 12scope:eqversion:1.2.2

Trust: 0.6

vendor:hitachimodel:ucosminexus operatorscope:eqversion:07-00-09

Trust: 0.6

vendor:hitachimodel:ucosminexus developer standardscope:eqversion:07-03-02

Trust: 0.6

vendor:sunmodel:jre 1.6.0 2scope: - version: -

Trust: 0.6

vendor:hitachimodel:tiered storage manager softwarescope:eqversion:6.1-01

Trust: 0.6

vendor:hitachimodel:cosminexus application server standard 06-51-/cscope: - version: -

Trust: 0.6

vendor:hitachimodel:cosminexus application server standard 06-00-/hscope: - version: -

Trust: 0.6

vendor:hitachimodel:cosminexus application server enterprise 06-00-/gscope: - version: -

Trust: 0.6

vendor:hitachimodel:ucosminexus application server enterprisescope:eqversion:07-00-09

Trust: 0.6

vendor:hitachimodel:cosminexus application server enterprise 06-51-/dscope: - version: -

Trust: 0.6

vendor:sunmodel:jre 1.4.2 27scope: - version: -

Trust: 0.6

vendor:sunmodel:jdk 11scope:eqversion:1.4.2

Trust: 0.6

vendor:sunmodel:jdk 07-b03scope:eqversion:1.5

Trust: 0.6

vendor:hitachimodel:tiered storage manager software )scope:eqversion:6.1.1-00

Trust: 0.6

vendor:sunmodel:jdk 06scope:eqversion:1.5

Trust: 0.6

vendor:hitachimodel:ucosminexus application server enterprisescope:eqversion:06-71

Trust: 0.6

vendor:sunmodel:jre b 007scope:eqversion:1.1.7

Trust: 0.6

vendor:hitachimodel:ucosminexus clientscope:eqversion:07-00-10

Trust: 0.6

vendor:hitachimodel:ucosminexus application server standardscope:eqversion:07-03-02

Trust: 0.6

vendor:sunmodel:jre 01scope:eqversion:1.3

Trust: 0.6

vendor:hitachimodel:ucosminexus service platformscope:eqversion:08-00-02

Trust: 0.6

vendor:hitachimodel:cosminexus application server standard 06-02-/fscope: - version: -

Trust: 0.6

vendor:hitachimodel:cosminexus application server 05-05-/oscope: - version: -

Trust: 0.6

vendor:hitachimodel:device manager softwarescope:eqversion:6.1-03

Trust: 0.6

vendor:hitachimodel:device manager softwarescope:eqversion:6.1-00

Trust: 0.6

vendor:hitachimodel:jp1/cm2/network node manager starter editionscope:eqversion:25008-10

Trust: 0.6

vendor:sunmodel:jre 1.5.0.0 08scope: - version: -

Trust: 0.6

vendor:hitachimodel:cosminexus application server enterprise 06-02-/escope: - version: -

Trust: 0.6

vendor:sunmodel:jdk 002scope:eqversion:1.1.8

Trust: 0.6

vendor:sunmodel:jre 1.3.1 19scope: - version: -

Trust: 0.6

vendor:sunmodel:jre 008scope:eqversion:1.1.8

Trust: 0.6

vendor:hitachimodel:processing kit for xmlscope:eqversion:02-05

Trust: 0.6

vendor:hitachimodel:tiered storage manager software )scope:eqversion:6.2-00

Trust: 0.6

vendor:hitachimodel:jp1/cm2/network node manager starter ed enterprisescope:eqversion:08-00

Trust: 0.6

vendor:sunmodel:jdk 1.5.0.0 12scope: - version: -

Trust: 0.6

vendor:hitachimodel:ucosminexus service platformscope:eqversion:07-00-10

Trust: 0.6

vendor:sunmodel:jre 1.3.1 18scope: - version: -

Trust: 0.6

vendor:hitachimodel:ucosminexus application server standard 06-71-/dscope: - version: -

Trust: 0.6

vendor:sunmodel:jdk 004scope:eqversion:1.2.2

Trust: 0.6

vendor:hitachimodel:ucosminexus application server standardscope:eqversion:07-10-01

Trust: 0.6

vendor:hitachimodel:cosminexus application server enterprisescope:eqversion:06-51

Trust: 0.6

vendor:hitachimodel:ucosminexus clientscope:eqversion:07-03-02

Trust: 0.6

vendor:hitachimodel:tiered storage manager softwarescope:eqversion:6.1-00

Trust: 0.6

vendor:hitachimodel:ucosminexus application server enterprisescope:eqversion:07-03-02

Trust: 0.6

vendor:sunmodel:jdk 009scope:eqversion:1.1.6

Trust: 0.6

vendor:hitachimodel:ucosminexus application server enterprise )scope:eqversion:08-00

Trust: 0.6

vendor:hitachimodel:cosminexus application server enterprise 06-02-/fscope: - version: -

Trust: 0.6

vendor:hitachimodel:ucosminexus application server enterprise 06-70-/b )scope: - version: -

Trust: 0.6

vendor:sunmodel:jdk 004scope:eqversion:1.2.1

Trust: 0.6

vendor:hitachimodel:ucosminexus application server standard )scope:eqversion:07-60

Trust: 0.6

vendor:hitachimodel:ucosminexus service platformscope:eqversion:07-10-06

Trust: 0.6

vendor:hitachimodel:ucosminexus application server enterprise 06-71-/ascope: - version: -

Trust: 0.6

vendor:hitachimodel:cosminexus application server enterprise 06-00-/hscope: - version: -

Trust: 0.6

vendor:sunmodel:jdk b 007scope:eqversion:1.1.7

Trust: 0.6

vendor:sunmodel:jdk 1.5.0.0 09scope: - version: -

Trust: 0.6

vendor:hitachimodel:cosminexus application server standard 06-00-/gscope: - version: -

Trust: 0.6

vendor:hitachimodel:cosminexus application server standard 06-00-/fscope: - version: -

Trust: 0.6

vendor:hitachimodel:tiered storage manager software )scope:eqversion:6.1-00

Trust: 0.6

vendor:hitachimodel:tiered storage manager softwarescope:eqversion:6.1.1-01

Trust: 0.6

vendor:hitachimodel:jp1/integrated management service supportscope:eqversion:-08-50

Trust: 0.6

vendor:hitachimodel:ucosminexus developer professionalscope:eqversion:07-03-02

Trust: 0.6

vendor:hitachimodel:jp1/integrated management service supportscope:eqversion:-08-10-06

Trust: 0.6

vendor:hitachimodel:jp1/integrated management service supportscope:eqversion:-08-10

Trust: 0.6

vendor:hitachimodel:device manager software )scope:eqversion:6.2-02

Trust: 0.6

vendor:hitachimodel:ucosminexus clientscope:eqversion:07-00-09

Trust: 0.6

vendor:hitachimodel:ucosminexus application server standardscope:eqversion:07-00-09

Trust: 0.6

vendor:hitachimodel:ucosminexus application server standardscope:eqversion:08-00-02

Trust: 0.6

vendor:hitachimodel:cosminexus application server enterprise 06-00-/iscope: - version: -

Trust: 0.6

vendor:hitachimodel:device manager software )scope:eqversion:6.2-00

Trust: 0.6

vendor:sunmodel:jdk 1.5.0.0 11scope: - version: -

Trust: 0.6

vendor:sunmodel:jdk 11-b03scope:eqversion:1.5

Trust: 0.6

vendor:hitachimodel:ucosminexus developer professionalscope:eqversion:07-00-09

Trust: 0.6

vendor:hitachimodel:jp1/integrated management service supportscope:eqversion:-08-11-04

Trust: 0.6

vendor:hitachimodel:tiered storage manager software )scope:eqversion:6.1-01

Trust: 0.6

vendor:sunmodel:jre 012scope:eqversion:1.2.2

Trust: 0.6

vendor:hitachimodel:ucosminexus application server standardscope:eqversion:07-00-10

Trust: 0.6

vendor:sunmodel:jre 005scope:eqversion:1.1.8

Trust: 0.6

vendor:hitachimodel:cosminexus application server enterprise )scope:eqversion:06-50

Trust: 0.6

vendor:hitachimodel:cosminexus application server standard )scope:eqversion:06-50

Trust: 0.6

vendor:hitachimodel:cosminexus application server standard 06-02-/escope: - version: -

Trust: 0.6

vendor:hitachimodel:cosminexus application server 05-05-/kscope: - version: -

Trust: 0.6

vendor:hitachimodel:tiered storage manager software )scope:eqversion:6.2-01

Trust: 0.6

vendor:hitachimodel:cosminexus application server standard 06-51-/escope: - version: -

Trust: 0.6

vendor:sunmodel:jre 1.5.0.0 07scope: - version: -

Trust: 0.6

vendor:sunmodel:jdk 1.6.0 01scope: - version: -

Trust: 0.6

vendor:sunmodel:jre 009scope:eqversion:1.1.8

Trust: 0.6

vendor:sunmodel:jre 1.6.0 20scope: - version: -

Trust: 0.6

vendor:ibmmodel:tivoli dynamic workload brokerscope:eqversion:1.0

Trust: 0.3

vendor:ibmmodel:virtual i/o serverscope:eqversion:2.2

Trust: 0.3

vendor:hitachimodel:ucosminexus clientscope:eqversion:08-00

Trust: 0.3

vendor:ibmmodel:rational clearquestscope:eqversion:7.0

Trust: 0.3

vendor:hitachimodel:cosminexus developer professional 06-02-/escope: - version: -

Trust: 0.3

vendor:redhatmodel:jboss enterprise web server for rhel esscope:eqversion:41.0

Trust: 0.3

vendor:hitachimodel:tiered storage manager softwarescope:neversion:6.4.0-08

Trust: 0.3

vendor:hitachimodel:cosminexus application server 05-00-/mscope: - version: -

Trust: 0.3

vendor:hitachimodel:cosminexus clientscope:eqversion:6

Trust: 0.3

vendor:hitachimodel:ucosminexus application server standard )scope:eqversion:07-00

Trust: 0.3

vendor:hitachimodel:processing kit for xml 01-07-/ascope: - version: -

Trust: 0.3

vendor:redhatmodel:enterprise linux serverscope:eqversion:6

Trust: 0.3

vendor:hitachimodel:jp1/hicommand tiered storage managerscope:eqversion:05-50

Trust: 0.3

vendor:fujitsumodel:interstage application server plusscope:eqversion:7.0.1

Trust: 0.3

vendor:ibmmodel:cognos business intelligence fp1scope:eqversion:88.4.1

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:6.0.4

Trust: 0.3

vendor:hitachimodel:cosminexus developer light 06-50-/ascope: - version: -

Trust: 0.3

vendor:hitachimodel:device manager software (linux(slesscope:neversion:7.1.0-00

Trust: 0.3

vendor:hitachimodel:processing kit for xml 01-07-/bscope: - version: -

Trust: 0.3

vendor:ibmmodel:tivoli netcool omnibus web guiscope:eqversion:7.3.0

Trust: 0.3

vendor:hitachimodel:device manager softwarescope:eqversion:7.0.1-02

Trust: 0.3

vendor:hitachimodel:cosminexus application server 05-02-/bscope: - version: -

Trust: 0.3

vendor:hitachimodel:ucosminexus application server enterprise 06-72-/bscope: - version: -

Trust: 0.3

vendor:redhatmodel:enterprise linux as extrasscope:eqversion:4

Trust: 0.3

vendor:hitachimodel:replication manager software (linux(rhelscope:eqversion:7.0.1-01

Trust: 0.3

vendor:ibmmodel:cognos workforce performancescope:eqversion:8.0

Trust: 0.3

vendor:hitachimodel:ucosminexus developer professional 06-70-/bscope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/integrated management service supportscope:eqversion:-08-50-02

Trust: 0.3

vendor:hitachimodel:ucosminexus application server enterprisescope:eqversion:07-20-02

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:6.0.17

Trust: 0.3

vendor:hitachimodel:cosminexus developer lightscope:eqversion:06-02

Trust: 0.3

vendor:hpmodel:network node manager iscope:eqversion:8.1

Trust: 0.3

vendor:hitachimodel:cosminexus developer 05-05-/hscope: - version: -

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:10.04

Trust: 0.3

vendor:ibmmodel:db2 fixpackscope:eqversion:9.55

Trust: 0.3

vendor:hitachimodel:ucosminexus developer standard 06-70-/dscope: - version: -

Trust: 0.3

vendor:hitachimodel:cosminexus developer light 06-00-/escope: - version: -

Trust: 0.3

vendor:ibmmodel:cognos customer performance analyticsscope:eqversion:8.0

Trust: 0.3

vendor:hitachimodel:cosminexus developer 05-05-/jscope: - version: -

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.5.19

Trust: 0.3

vendor:hitachimodel:ucosminexus application server enterprise 06-70-/hscope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/integrated management service supportscope:eqversion:-08-50-01

Trust: 0.3

vendor:hitachimodel:cosminexus server web edition 04-00-/ascope:eqversion: -

Trust: 0.3

vendor:hitachimodel:cosminexus developer light 06-00-/ascope: - version: -

Trust: 0.3

vendor:hitachimodel:cosminexus application server standard 06-50-/c (solariscope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/cm2/network node manager starter ed enterprise (hp-ux(pa-rscope:eqversion:08-00-02

Trust: 0.3

vendor:hitachimodel:cosminexus developer light 06-02-/escope: - version: -

Trust: 0.3

vendor:hitachimodel:ucosminexus developer standardscope:eqversion:07-03-03

Trust: 0.3

vendor:ibmmodel:tivoli workload schedulerscope:eqversion:8.1

Trust: 0.3

vendor:hitachimodel:provisioning manager software (solaris(spscope:eqversion:6.0.0-00

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.2

Trust: 0.3

vendor:fujitsumodel:systemwalker availability view enterprise edition 13.3.0ascope: - version: -

Trust: 0.3

vendor:ibmmodel:os/400 v5r4m0scope: - version: -

Trust: 0.3

vendor:hitachimodel:device manager software (linux(slesscope:neversion:6.4.0-08

Trust: 0.3

vendor:hitachimodel:cosminexus developer lightscope:eqversion:06-50

Trust: 0.3

vendor:hitachimodel:cosminexus developer standard 06-51-/ascope: - version: -

Trust: 0.3

vendor:sunmodel:jdk 01scope:eqversion:1.3

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.1

Trust: 0.3

vendor:ubuntumodel:linux sparcscope:eqversion:10.04

Trust: 0.3

vendor:sunmodel:jdkscope:eqversion:1.3.107

Trust: 0.3

vendor:hitachimodel:cosminexus application server enterprise 06-02-/gscope: - version: -

Trust: 0.3

vendor:hitachimodel:cosminexus application server 05-00-/rscope: - version: -

Trust: 0.3

vendor:hitachimodel:cosminexus clientscope:eqversion:06-02

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:7.0.5

Trust: 0.3

vendor:hitachimodel:ucosminexus developer standardscope:eqversion:07-00-01

Trust: 0.3

vendor:ibmmodel:tivoli netcool performance manager for wirelessscope:eqversion:9.2

Trust: 0.3

vendor:hitachimodel:ucosminexus application server standardscope:eqversion:06-72

Trust: 0.3

vendor:hitachimodel:tiered storage manager softwarescope:eqversion:6.0.0-00

Trust: 0.3

vendor:hitachimodel:tiered storage manager software (solaris(spscope:eqversion:6.0.0-00

Trust: 0.3

vendor:hitachimodel:cosminexus developer professional 06-51-/hscope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/hicommand replication monitorscope:eqversion:05-50-01

Trust: 0.3

vendor:ibmmodel:tivoli storage productivity centerscope:eqversion:4.2.1

Trust: 0.3

vendor:ibmmodel:cognos mobilescope:eqversion:8.0

Trust: 0.3

vendor:ibmmodel:tivoli foundations for application managerscope:eqversion:1.1.1

Trust: 0.3

vendor:hitachimodel:cosminexus clientscope:eqversion:06-50

Trust: 0.3

vendor:hitachimodel:cosminexus application server standard 06-51-/hscope: - version: -

Trust: 0.3

vendor:hpmodel:hp-ux web server suitescope:neversion:3.14

Trust: 0.3

vendor:susemodel:linux enterprise sdk sp3scope:eqversion:10

Trust: 0.3

vendor:hitachimodel:cosminexus developer 05-05-/escope: - version: -

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:6.0.18

Trust: 0.3

vendor:hpmodel:openvms secure web serverscope:eqversion:1.2

Trust: 0.3

vendor:hitachimodel:cosminexus application server 05-01-/kscope: - version: -

Trust: 0.3

vendor:hitachimodel:cosminexus developer light 06-50-/escope: - version: -

Trust: 0.3

vendor:redhatmodel:jboss enterprise soa platformscope:eqversion:5.0.2

Trust: 0.3

vendor:redhatmodel:jboss enterprise portal platformscope:eqversion:5.1.0

Trust: 0.3

vendor:hitachimodel:cosminexus developer standard 06-51-/cscope: - version: -

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:6.1.0.35

Trust: 0.3

vendor:ibmmodel:tivoli composite application manager for webspherescope:eqversion:6.1

Trust: 0.3

vendor:sunmodel:jre bscope:eqversion:1.1.7

Trust: 0.3

vendor:hitachimodel:ucosminexus developer standard 06-71-/hscope: - version: -

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.5.14

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:7.0.3

Trust: 0.3

vendor:mandrivamodel:linux mandrake x86 64scope:eqversion:2010.0

Trust: 0.3

vendor:hitachimodel:ucosminexus developer professionalscope:eqversion:07-00-03

Trust: 0.3

vendor:hitachimodel:ucosminexus application server standardscope:eqversion:07-00-03

Trust: 0.3

vendor:hitachimodel:ucosminexus clientscope:eqversion:07-20

Trust: 0.3

vendor:hitachimodel:jp1/hicommand tiered storage managerscope:eqversion:05-30

Trust: 0.3

vendor:hitachimodel:cosminexus developer light 06-51-/kscope: - version: -

Trust: 0.3

vendor:mandrivamodel:linux mandrake x86 64scope:eqversion:2009.0

Trust: 0.3

vendor:ibmmodel:tivoli workload schedulerscope:eqversion:8.3

Trust: 0.3

vendor:ibmmodel:websphere application server community editionscope:eqversion:2.1.1.4

Trust: 0.3

vendor:sunmodel:jre .0 01scope:eqversion:1.3

Trust: 0.3

vendor:hitachimodel:ucosminexus operatorscope:eqversion:07-50-01

Trust: 0.3

vendor:debianmodel:linux armelscope:eqversion:5.0

Trust: 0.3

vendor:hitachimodel:jp1/hicommand provisioning managerscope:eqversion:02-30

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:6.1.22

Trust: 0.3

vendor:hitachimodel:ucosminexus developer light 06-71-/fscope: - version: -

Trust: 0.3

vendor:ibmmodel:tivoli enterprise consolescope:eqversion:0

Trust: 0.3

vendor:sunmodel:jdk 1.5.0 11scope: - version: -

Trust: 0.3

vendor:hitachimodel:cosminexus developer professional 06-00-/gscope: - version: -

Trust: 0.3

vendor:sunmodel:jdkscope:eqversion:1.3.128

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5

Trust: 0.3

vendor:hitachimodel:ucosminexus developer professionalscope:eqversion:07-50-10

Trust: 0.3

vendor:hitachimodel:ucosminexus service platformscope:eqversion:07-50-01

Trust: 0.3

vendor:sunmodel:jdk 09scope:eqversion:1.1.8

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:6.0.6

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.5

Trust: 0.3

vendor:hitachimodel:it operations directorscope:eqversion:02-50-06

Trust: 0.3

vendor:hitachimodel:cosminexus application server enterprise 06-50-c (solarisscope: - version: -

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:10.10

Trust: 0.3

vendor:oraclemodel:jrockit r28.0.0scope: - version: -

Trust: 0.3

vendor:fujitsumodel:interstage application server enterprise editionscope:eqversion:8.0.2

Trust: 0.3

vendor:hitachimodel:ucosminexus client 06-70-/fscope: - version: -

Trust: 0.3

vendor:sunmodel:jre 12scope:eqversion:1.1.8

Trust: 0.3

vendor:ibmmodel:infosphere information serverscope:eqversion:8.0

Trust: 0.3

vendor:debianmodel:linux sparcscope:eqversion:5.0

Trust: 0.3

vendor:hitachimodel:cosminexus application server standard 06-51-/kscope: - version: -

Trust: 0.3

vendor:ibmmodel:tivoli netcool performance managerscope:eqversion:1.2.1

Trust: 0.3

vendor:ibmmodel:cognos impromptu web reportsscope:eqversion:7.0

Trust: 0.3

vendor:hitachimodel:ucosminexus application server standardscope:eqversion:07-00-02

Trust: 0.3

vendor:hitachimodel:ucosminexus operatorscope:eqversion:07-50-10

Trust: 0.3

vendor:sunmodel:jdk 1.5.0.0 06scope: - version: -

Trust: 0.3

vendor:hpmodel:systems insight managerscope:eqversion:5.3

Trust: 0.3

vendor:sunmodel:jdkscope:eqversion:1.3.1

Trust: 0.3

vendor:hitachimodel:cosminexus developer standard 06-00-/ascope: - version: -

Trust: 0.3

vendor:hitachimodel:cosminexus developer standard 06-02-/bscope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/cm2/network node manager starter edition enterprise hp-uxscope:eqversion:08-10-02

Trust: 0.3

vendor:attachmatemodel:reflection for secure it unix server sp1scope:eqversion:7.0

Trust: 0.3

vendor:hitachimodel:cosminexus developer professional 06-00-/bscope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/hicommand tiered storage managerscope:eqversion:04-00

Trust: 0.3

vendor:fujitsumodel:interstage application server standard-j edition 9.1.0bscope: - version: -

Trust: 0.3

vendor:hitachimodel:ucosminexus clientscope:eqversion:07-50

Trust: 0.3

vendor:hitachimodel:device manager software (solarisscope:eqversion:6.1-00(x64))

Trust: 0.3

vendor:hitachimodel:cosminexus developer light 06-02-/ascope: - version: -

Trust: 0.3

vendor:avayamodel:conferencing standard editionscope:eqversion:6.0.1

Trust: 0.3

vendor:hpmodel:openvms secure web serverscope:eqversion:7.3-2

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.5.18

Trust: 0.3

vendor:hpmodel:tru64 unix 5.1b-4scope: - version: -

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:6.0.2

Trust: 0.3

vendor:vmwaremodel:vcenter update manager updatescope:eqversion:4.11

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:6.1.2

Trust: 0.3

vendor:ubuntumodel:linux sparcscope:eqversion:9.10

Trust: 0.3

vendor:hitachimodel:ucosminexus developer standard 06-70-/fscope: - version: -

Trust: 0.3

vendor:fujitsumodel:interstage application server plusscope:eqversion:6.0

Trust: 0.3

vendor:ibmmodel:rational clearquestscope:eqversion:7.0.1.11

Trust: 0.3

vendor:ibmmodel:rational clearquestscope:eqversion:7.0.1.5

Trust: 0.3

vendor:hitachimodel:cosminexus developer professional 06-51-/gscope: - version: -

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:7.0.1

Trust: 0.3

vendor:vmwaremodel:vcenter update managerscope:eqversion:4.0

Trust: 0.3

vendor:hitachimodel:ucosminexus application server enterprise )scope:eqversion:07-00

Trust: 0.3

vendor:ibmmodel:cognos expressscope:eqversion:9.0

Trust: 0.3

vendor:hitachimodel:tuning manager softwarescope:neversion:7.1.0-00

Trust: 0.3

vendor:oraclemodel:jrockit r28.1.1scope: - version: -

Trust: 0.3

vendor:ibmmodel:tivoli dynamic workload consolescope:eqversion:8.0

Trust: 0.3

vendor:novellmodel:identity manager remote loaderscope:eqversion:3.6.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.5

Trust: 0.3

vendor:hitachimodel:cosminexus application server standard 06-51-/jscope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/hicommand global link availability managerscope:eqversion:05-30

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6

Trust: 0.3

vendor:hitachimodel:ucosminexus clientscope:eqversion:07-03-03

Trust: 0.3

vendor:hitachimodel:jp1/hicommand tuning managerscope:eqversion:0

Trust: 0.3

vendor:hitachimodel:processing kit for xml )scope:eqversion:02-00

Trust: 0.3

vendor:hitachimodel:jp1/hicommand global link availability managerscope:eqversion:05-02

Trust: 0.3

vendor:ibmmodel:tivoli workload scehdule z/os connectorscope:eqversion:8.0

Trust: 0.3

vendor:hitachimodel:cosminexus studio web edition 04-01-/ascope:eqversion: -

Trust: 0.3

vendor:hitachimodel:tuning manager software )scope:eqversion:6.401

Trust: 0.3

vendor:sunmodel:jdkscope:eqversion:1.3.126

Trust: 0.3

vendor:fujitsumodel:interstage application server enterprise editionscope:eqversion:7.0

Trust: 0.3

vendor:hitachimodel:cosminexus developer 05-05-/iscope: - version: -

Trust: 0.3

vendor:hitachimodel:ucosminexus developer professional 06-70-/gscope: - version: -

Trust: 0.3

vendor:hitachimodel:ucosminexus clientscope:eqversion:07-10-01

Trust: 0.3

vendor:hitachimodel:ucosminexus client 06-70-/gscope: - version: -

Trust: 0.3

vendor:ibmmodel:rational clearcasescope:eqversion:7.0.0.5

Trust: 0.3

vendor:sunmodel:jdk updatescope:eqversion:1.6.018

Trust: 0.3

vendor:sunmodel:jdk updatescope:eqversion:1.6.019

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.3

Trust: 0.3

vendor:redhatmodel:enterprise linux hpc node optionalscope:eqversion:6

Trust: 0.3

vendor:hitachimodel:cosminexus developer professional 06-00-/cscope: - version: -

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.6

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.5.22

Trust: 0.3

vendor:hitachimodel:ucosminexus service platformscope:eqversion:07-50-02

Trust: 0.3

vendor:redhatmodel:enterprise linux server supplementaryscope:eqversion:6

Trust: 0.3

vendor:hitachimodel:ucosminexus service platformscope:eqversion:07-20

Trust: 0.3

vendor:hitachimodel:ucosminexus developer standardscope:eqversion:07-50-01

Trust: 0.3

vendor:novellmodel:identity manager roles based provisioning modulescope:eqversion:3.6.1

Trust: 0.3

vendor:hpmodel:systems insight manager sp2scope:eqversion:5.2

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.5.23

Trust: 0.3

vendor:hitachimodel:cosminexus developer professional 06-00-/ascope: - version: -

Trust: 0.3

vendor:sunmodel:jdk 1.5.0 11-b03scope: - version: -

Trust: 0.3

vendor:ibmmodel:tivoli network manager ip editionscope:eqversion:3.8

Trust: 0.3

vendor:hitachimodel:cosminexus developer light 06-00-/iscope: - version: -

Trust: 0.3

vendor:hitachimodel:cosminexus application server standard 06-02-/gscope: - version: -

Trust: 0.3

vendor:hpmodel:nonstop serverscope:eqversion:6

Trust: 0.3

vendor:hitachimodel:provisioning manager software (solaris(spscope:eqversion:6.4.0-07

Trust: 0.3

vendor:hitachimodel:cosminexus developer 05-05-/oscope: - version: -

Trust: 0.3

vendor:attachmatemodel:reflection for secure it windows server sp1scope:eqversion:7.0

Trust: 0.3

vendor:hitachimodel:ucosminexus application server enterprisescope:eqversion:07-10-06

Trust: 0.3

vendor:sunmodel:jre 007scope:eqversion:1.1.6

Trust: 0.3

vendor:hitachimodel:replication manager software -00 )scope:neversion:7.3

Trust: 0.3

vendor:redhatmodel:enterprise linux workstation supplementaryscope:eqversion:6

Trust: 0.3

vendor:hitachimodel:cosminexus developer professional 06-02-/fscope: - version: -

Trust: 0.3

vendor:hitachimodel:cosminexus application server enterprise 06-50-/iscope: - version: -

Trust: 0.3

vendor:hitachimodel:ucosminexus developer professional 06-70-/dscope: - version: -

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:6.0.25

Trust: 0.3

vendor:mandrivamodel:linux mandrakescope:eqversion:2010.0

Trust: 0.3

vendor:hpmodel:systems insight manager sp3scope:eqversion:5.0

Trust: 0.3

vendor:hitachimodel:ucosminexus service architectscope:eqversion:07-60

Trust: 0.3

vendor:hitachimodel:ucosminexus client 06-70-/dscope: - version: -

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:10.10

Trust: 0.3

vendor:hitachimodel:ucosminexus developer standard 06-71-/gscope: - version: -

Trust: 0.3

vendor:hitachimodel:ucosminexus application server enterprisescope:eqversion:07-00-03

Trust: 0.3

vendor:sunmodel:jre 15scope:eqversion:1.3.1

Trust: 0.3

vendor:mandrivamodel:linux mandrakescope:eqversion:2009.0

Trust: 0.3

vendor:hitachimodel:tiered storage manager softwarescope:eqversion:6.4.0-07

Trust: 0.3

vendor:hitachimodel:cosminexus developer light 06-51-/iscope: - version: -

Trust: 0.3

vendor:hpmodel:openvms secure web serverscope:eqversion:7.3-1

Trust: 0.3

vendor:hitachimodel:jp1/hicommand replication monitorscope:eqversion:0

Trust: 0.3

vendor:redhatmodel:jboss enterprise web platform for rhel serverscope:eqversion:55

Trust: 0.3

vendor:hitachimodel:jp1/hicommand global link availability managerscope:eqversion:05-40

Trust: 0.3

vendor:hitachimodel:tiered storage manager software (solaris(spscope:eqversion:6.4.0-07

Trust: 0.3

vendor:hitachimodel:cosminexus developer light 06-00-/dscope: - version: -

Trust: 0.3

vendor:hitachimodel:cosminexus developer light 06-50-/bscope: - version: -

Trust: 0.3

vendor:redhatmodel:jboss enterprise web platform for rhel 4asscope:eqversion:5

Trust: 0.3

vendor:hitachimodel:cosminexus developer professional 06-51-/fscope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/hicommand global link availability managerscope:eqversion:05-10

Trust: 0.3

vendor:sunmodel:jdk 04scope:eqversion:1.3

Trust: 0.3

vendor:hitachimodel:ucosminexus service platform )scope:eqversion:07-10

Trust: 0.3

vendor:hitachimodel:tiered storage manager software (linux(rhelscope:neversion:7.1.0-00

Trust: 0.3

vendor:hitachimodel:ucosminexus developer light 06-70-/ascope: - version: -

Trust: 0.3

vendor:hitachimodel:cosminexus client 06-51-/kscope: - version: -

Trust: 0.3

vendor:hitachimodel:device manager software (solarisscope:eqversion:6.0-00(x64))

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:9.10

Trust: 0.3

vendor:hitachimodel:global link manager softwarescope:eqversion:6.1-01

Trust: 0.3

vendor:ibmmodel:ewasscope:eqversion:6.138

Trust: 0.3

vendor:hitachimodel:cosminexus developer 05-01-/hscope: - version: -

Trust: 0.3

vendor:ibmmodel:db2 fixpackscope:eqversion:9.18

Trust: 0.3

vendor:hitachimodel:cosminexus developer 05-01-/ascope: - version: -

Trust: 0.3

vendor:ibmmodel:tivoli management frameworkscope:eqversion:4.1.1

Trust: 0.3

vendor:fujitsumodel:interstage application server standard-j editionscope:eqversion:9.3.1

Trust: 0.3

vendor:hitachimodel:cosminexus application server enterprise 06-51-/iscope: - version: -

Trust: 0.3

vendor:hitachimodel:ucosminexus developer professionalscope:eqversion:07-60

Trust: 0.3

vendor:hitachimodel:cosminexus developer light 06-51-/gscope: - version: -

Trust: 0.3

vendor:hpmodel:hp-ux web server suitescope:neversion:2.33

Trust: 0.3

vendor:ibmmodel:rational clearquestscope:eqversion:7.1.1.4

Trust: 0.3

vendor:hitachimodel:ucosminexus application server standardscope:eqversion:07-00-05

Trust: 0.3

vendor:hitachimodel:cosminexus application server enterprise 06-51-/kscope: - version: -

Trust: 0.3

vendor:ibmmodel:tivoli federated identity managerscope:eqversion:6.2.1

Trust: 0.3

vendor:hitachimodel:jp1/cm2/network node manager starter ed enterprise hp-uxscope:eqversion:08-00-03

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.0.14

Trust: 0.3

vendor:sunmodel:jre 07scope:eqversion:1.4.1

Trust: 0.3

vendor:hitachimodel:ucosminexus clientscope:eqversion:07-50-09

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.0.30

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.4

Trust: 0.3

vendor:ibmmodel:rational clearquestscope:eqversion:7.1.1

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:6.1.3

Trust: 0.3

vendor:hitachimodel:tuning manager softwarescope:eqversion:6.2-00

Trust: 0.3

vendor:hitachimodel:cosminexus developer 05-01-/gscope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/hicommand global link availability managerscope:eqversion:05-01

Trust: 0.3

vendor:hitachimodel:ucosminexus application server enterprise )scope:eqversion:09-80

Trust: 0.3

vendor:attachmatemodel:reflection for secure it unix clientscope:eqversion:7.2

Trust: 0.3

vendor:hitachimodel:cosminexus developer light 06-51-/jscope: - version: -

Trust: 0.3

vendor:hitachimodel:tiered storage manager software (linux(rhelscope:neversion:6.4.0-08

Trust: 0.3

vendor:hitachimodel:jp1/cm2/network node manager starter edition (hp-ux(pa-riscscope:eqversion:25008-10

Trust: 0.3

vendor:hitachimodel:cosminexus developer 05-01-/kscope: - version: -

Trust: 0.3

vendor:hitachimodel:ucosminexus operatorscope:eqversion:07-10-01

Trust: 0.3

vendor:hitachimodel:cosminexus developer professional 06-00-/hscope: - version: -

Trust: 0.3

vendor:susemodel:linux enterprise java sp1scope:eqversion:11

Trust: 0.3

vendor:sunmodel:jre 009scope:eqversion:1.1.6

Trust: 0.3

vendor:sunmodel:jre 1.5.0 08scope: - version: -

Trust: 0.3

vendor:hitachimodel:cosminexus developer light 06-51-/ascope: - version: -

Trust: 0.3

vendor:hitachimodel:ucosminexus developer standardscope:eqversion:07-50-02

Trust: 0.3

vendor:hitachimodel:jp1/hicommand global link availability managerscope:eqversion:05-03

Trust: 0.3

vendor:hitachimodel:jp1/hicommand provisioning managerscope:eqversion:05-90

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.5.2

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.0.13

Trust: 0.3

vendor:ibmmodel:cognos planningscope:eqversion:8.0

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:6.1.15

Trust: 0.3

vendor:ibmmodel:rational clearcasescope:eqversion:7.0.1

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:6.0

Trust: 0.3

vendor:hitachimodel:cosminexus developerscope:eqversion:5

Trust: 0.3

vendor:redhatmodel:desktop extrasscope:eqversion:4

Trust: 0.3

vendor:hitachimodel:ucosminexus application server enterprise 06-70-/a (windows(ipscope: - version: -

Trust: 0.3

vendor:hitachimodel:cosminexus developer professionalscope:eqversion:06-02

Trust: 0.3

vendor:hitachimodel:jp1/hicommand global link availability managerscope:eqversion:05-05

Trust: 0.3

vendor:sunmodel:jre b 005scope:eqversion:1.1.7

Trust: 0.3

vendor:hitachimodel:tiered storage manager software (linux(slesscope:neversion:7.1.0-00

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:6.0.29

Trust: 0.3

vendor:redhatmodel:jboss enterprise application platform for rhel 4asscope:eqversion:5

Trust: 0.3

vendor:ibmmodel:websphere application server community editionscope:neversion:2.1.1.5

Trust: 0.3

vendor:hitachimodel:tuning manager software )scope:eqversion:6.2-00

Trust: 0.3

vendor:ibmmodel:tivoli application dependency discovery managerscope:eqversion:7.1

Trust: 0.3

vendor:ibmmodel:tivoli configuration managerscope:eqversion:4.2.3

Trust: 0.3

vendor:ibmmodel:cognos business intelligencescope:eqversion:10.0

Trust: 0.3

vendor:hitachimodel:cosminexus developer professionalscope:eqversion:06-50

Trust: 0.3

vendor:sunmodel:jdk update21scope:eqversion:1.5.0

Trust: 0.3

vendor:hitachimodel:ucosminexus application server standardscope:eqversion:07-20-01

Trust: 0.3

vendor:hpmodel:systems insight manager sp1scope:eqversion:4.2

Trust: 0.3

vendor:sunmodel:jre 11scope:eqversion:1.2.2

Trust: 0.3

vendor:hitachimodel:device manager software (linux(rhelscope:eqversion:7.0.1-02

Trust: 0.3

vendor:hitachimodel:replication manager software (linux(rhelscope:eqversion:7.0.0-00

Trust: 0.3

vendor:hpmodel:network node manager iscope:eqversion:9.1

Trust: 0.3

vendor:vmwaremodel:esx patch esx400-201scope:eqversion:4.0

Trust: 0.3

vendor:hitachimodel:tiered storage manager software (linux(rhelscope:eqversion:6.2.0-00

Trust: 0.3

vendor:ibmmodel:netcool/omnibus fix packscope:eqversion:7.3.020

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.5.8

Trust: 0.3

vendor:hitachimodel:cosminexus application server 05-01-/gscope: - version: -

Trust: 0.3

vendor:hitachimodel:cosminexus developer professional 06-51-/escope: - version: -

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:6.0.20

Trust: 0.3

vendor:hitachimodel:cosminexus developer lightscope:eqversion:06-51

Trust: 0.3

vendor:avayamodel:conferencing standard editionscope:neversion:7.0

Trust: 0.3

vendor:novellmodel:identity manager designerscope:eqversion:4.0

Trust: 0.3

vendor:hitachimodel:cosminexus developer lightscope:eqversion:06-00

Trust: 0.3

vendor:hitachimodel:ucosminexus developer standardscope:eqversion:07-50

Trust: 0.3

vendor:hitachimodel:cosminexus developer 05-05-/ascope: - version: -

Trust: 0.3

vendor:sunmodel:jre 21scope:eqversion:1.4.2

Trust: 0.3

vendor:redhatmodel:enterprise linux hpc nodescope:eqversion:6

Trust: 0.3

vendor:ibmmodel:rational clearquestscope:eqversion:7.1.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.2

Trust: 0.3

vendor:redhatmodel:enterprise linux serverscope:eqversion:5

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.7

Trust: 0.3

vendor:susemodel:linux enterprise java sp4scope:eqversion:10

Trust: 0.3

vendor:hitachimodel:ucosminexus application server enterprisescope:eqversion:07-00-05

Trust: 0.3

vendor:ibmmodel:tivoli directory server 6.1.0.5-tiv-itds-if0scope:neversion: -

Trust: 0.3

vendor:vmwaremodel:virtualcenter updatescope:eqversion:2.56

Trust: 0.3

vendor:hitachimodel:ucosminexus operatorscope:eqversion:07-50-09

Trust: 0.3

vendor:sunmodel:jdkscope:eqversion:1.3.115

Trust: 0.3

vendor:ibmmodel:ewasscope:neversion:6.139

Trust: 0.3

vendor:apachemodel:tomcat betascope:eqversion:7.0

Trust: 0.3

vendor:ibmmodel:tivoli workload schedulerscope:eqversion:8.5

Trust: 0.3

vendor:hitachimodel:cosminexus developer professional 06-50-/bscope: - version: -

Trust: 0.3

vendor:sunmodel:jdkscope:eqversion:1.3.102

Trust: 0.3

vendor:hitachimodel:ucosminexus service architectscope:eqversion:07-00

Trust: 0.3

vendor:fujitsumodel:systemwalker availability view enterprise editionscope:eqversion:13.3

Trust: 0.3

vendor:ibmmodel:websphere mq file transfer editionscope:eqversion:7.0

Trust: 0.3

vendor:fujitsumodel:interstage application server standard-j editionscope:eqversion:9.2

Trust: 0.3

vendor:hitachimodel:cosminexus studio 05-00-/iscope: - version: -

Trust: 0.3

vendor:hitachimodel:cosminexus application server 05-00-/lscope: - version: -

Trust: 0.3

vendor:hitachimodel:ucosminexus developer professional 06-71-/ascope: - version: -

Trust: 0.3

vendor:hitachimodel:ucosminexus service platformscope:eqversion:07-50-09

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:6.0.15

Trust: 0.3

vendor:hpmodel:systems insight managerscope:eqversion:6.2

Trust: 0.3

vendor:hitachimodel:device manager software (linux(slesscope:eqversion:6.3.0-00

Trust: 0.3

vendor:debianmodel:linux mipsscope:eqversion:5.0

Trust: 0.3

vendor:fujitsumodel:systemwalker it process master standard editionscope:eqversion:13.3.1

Trust: 0.3

vendor:sunmodel:jdkscope:eqversion:1.3.103

Trust: 0.3

vendor:hitachimodel:device manager software )scope:eqversion:6.1-03

Trust: 0.3

vendor:hitachimodel:ucosminexus developer professional 06-71-/dscope: - version: -

Trust: 0.3

vendor:hitachimodel:cosminexus developer standardscope:eqversion:06-02

Trust: 0.3

vendor:debianmodel:linux m68kscope:eqversion:5.0

Trust: 0.3

vendor:hitachimodel:tiered storage manager software (linux(rhelscope:eqversion:6.4.0-07

Trust: 0.3

vendor:hitachimodel:ucosminexus service architectscope:eqversion:07-10

Trust: 0.3

vendor:hitachimodel:ucosminexus developer standardscope:eqversion:07-10-01

Trust: 0.3

vendor:ibmmodel:db2 fixpackscope:eqversion:9.56

Trust: 0.3

vendor:hitachimodel:ucosminexus developer professionalscope:eqversion:07-00

Trust: 0.3

vendor:hitachimodel:cosminexus developer standard 06-50-/bscope: - version: -

Trust: 0.3

vendor:hitachimodel:ucosminexus service architectscope:eqversion:07-00-05

Trust: 0.3

vendor:oraclemodel:jrockit r27.6.0-50scope:eqversion:1.5.015

Trust: 0.3

vendor:hitachimodel:jp1/hicommand tuning managerscope:eqversion:05-50

Trust: 0.3

vendor:hitachimodel:cosminexus application server 05-02-/escope: - version: -

Trust: 0.3

vendor:hitachimodel:cosminexus developer standardscope:eqversion:06-50

Trust: 0.3

vendor:fujitsumodel:interstage application server standard-j editionscope:eqversion:9.0

Trust: 0.3

vendor:vmwaremodel:virtualcenter updatescope:eqversion:2.55

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:11.3

Trust: 0.3

vendor:sunmodel:jdk 01scope:eqversion:1.6

Trust: 0.3

vendor:attachmatemodel:reflection suite forscope:eqversion:x2011

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:6.0.7

Trust: 0.3

vendor:hitachimodel:ucosminexus developer professionalscope:eqversion:07-10

Trust: 0.3

vendor:hitachimodel:cosminexus studio 05-01-/lscope: - version: -

Trust: 0.3

vendor:hpmodel:hp-ux web server suitescope:eqversion:2.32

Trust: 0.3

vendor:hitachimodel:ucosminexus operatorscope:eqversion:07-00

Trust: 0.3

vendor:ibmmodel:rational clearquestscope:eqversion:7.0.0.6

Trust: 0.3

vendor:hitachimodel:ucosminexus application server enterprise 06-70-/a linux )scope: - version: -

Trust: 0.3

vendor:oraclemodel:jrockit r27.6.5scope: - version: -

Trust: 0.3

vendor:sunmodel:sdkscope:eqversion:1.4.222

Trust: 0.3

vendor:sunmodel:jdk 03scope:eqversion:1.3

Trust: 0.3

vendor:hitachimodel:device manager softwarescope:neversion:6.4.0-08

Trust: 0.3

vendor:ibmmodel:cics transaction gatewayscope:eqversion:7.0

Trust: 0.3

vendor:hitachimodel:ucosminexus service platformscope:eqversion:07-20-02

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.5

Trust: 0.3

vendor:hitachimodel:ucosminexus developer professional 06-70-/ascope: - version: -

Trust: 0.3

vendor:hpmodel:systems insight manager sp1scope:eqversion:5.0

Trust: 0.3

vendor:redhatmodel:jboss enterprise application platform el4scope:eqversion:4.3

Trust: 0.3

vendor:hitachimodel:processing kit for xml 02-00-/cscope: - version: -

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.4

Trust: 0.3

vendor:hitachimodel:ucosminexus application server enterprise 06-71-/fscope: - version: -

Trust: 0.3

vendor:hitachimodel:ucosminexus developer light 06-71-/gscope: - version: -

Trust: 0.3

vendor:hitachimodel:ucosminexus developer professional 06-71-/bscope: - version: -

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.5.21

Trust: 0.3

vendor:susemodel:linux enterprise server sp4scope:eqversion:10

Trust: 0.3

vendor:fujitsumodel:interstage application server enterprise editionscope:eqversion:9.3.1

Trust: 0.3

vendor:hitachimodel:cosminexus application server standard 06-50-/gscope: - version: -

Trust: 0.3

vendor:hitachimodel:cosminexus application server enterprise 06-51-/hscope: - version: -

Trust: 0.3

vendor:redhatmodel:enterprise linux extrasscope:eqversion:4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.6

Trust: 0.3

vendor:hitachimodel:ucosminexus operatorscope:eqversion:0

Trust: 0.3

vendor:vmwaremodel:vcenter updatescope:eqversion:4.03

Trust: 0.3

vendor:hitachimodel:global link manager softwarescope:eqversion:6.5-00

Trust: 0.3

vendor:ibmmodel:rational clearcasescope:neversion:7.1.2.2

Trust: 0.3

vendor:hitachimodel:cosminexus application server enterprise 06-50-/c (hp-ux(scope: - version: -

Trust: 0.3

vendor:hitachimodel:ucosminexus application server standard 06-70-/lscope: - version: -

Trust: 0.3

vendor:hitachimodel:cosminexus developer professional 06-00-/iscope: - version: -

Trust: 0.3

vendor:sunmodel:jdk 14scope:eqversion:1.1.8

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.4

Trust: 0.3

vendor:hitachimodel:cosminexus application server 05-02-/ascope: - version: -

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.2

Trust: 0.3

vendor:hitachimodel:device manager software (linux(rhelscope:eqversion:6.4.0-07

Trust: 0.3

vendor:hitachimodel:cosminexus developer standard 06-50-/fscope: - version: -

Trust: 0.3

vendor:ibmmodel:cognos supply chain performance analyticsscope:eqversion:8.0

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:6.0.27

Trust: 0.3

vendor:sunmodel:jdkscope:eqversion:1.3.105

Trust: 0.3

vendor:hitachimodel:ucosminexus developer standardscope:eqversion:07-50-09

Trust: 0.3

vendor:hitachimodel:global link manager softwarescope:eqversion:0

Trust: 0.3

vendor:apachemodel:tomcatscope:neversion:7.0.8

Trust: 0.3

vendor:hitachimodel:ucosminexus application server enterprise 06-70-/mscope: - version: -

Trust: 0.3

vendor:ibmmodel:cognos mobilescope:eqversion:10.0

Trust: 0.3

vendor:redhatmodel:network satellite server (for rhelscope:eqversion:5)5.4

Trust: 0.3

vendor:ibmmodel:tivoli federated identity managerscope:eqversion:6.2

Trust: 0.3

vendor:hpmodel:systems insight manager sp5scope:eqversion:5.0

Trust: 0.3

vendor:sunmodel:jre 10scope:eqversion:1.1.8

Trust: 0.3

vendor:hitachimodel:tuning manager software )scope:eqversion:7.001

Trust: 0.3

vendor:ibmmodel:tivoli composite application managerscope:eqversion:6.1

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.3

Trust: 0.3

vendor:sunmodel:jdk update24scope:eqversion:1.5.0

Trust: 0.3

vendor:hitachimodel:cosminexus application server 05-02-/dscope: - version: -

Trust: 0.3

vendor:sunmodel:jdk 02scope:eqversion:1.3

Trust: 0.3

vendor:hpmodel:tru64 unix pk6scope:eqversion:5.1.0

Trust: 0.3

vendor:ibmmodel:rational clearquestscope:eqversion:7.0.0.5

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.0.9

Trust: 0.3

vendor:hitachimodel:jp1/hicommand provisioning manager )scope:eqversion:05-10

Trust: 0.3

vendor:hitachimodel:tiered storage manager softwarescope:neversion:7.1.0-00

Trust: 0.3

vendor:hitachimodel:device manager software (linux(slesscope:eqversion:6.4.0-07

Trust: 0.3

vendor:redhatmodel:enterprise linux desktop supplementaryscope:eqversion:6

Trust: 0.3

vendor:hitachimodel:jp1/cm2/network node manager starter edition enterprise hp-ux pa-riscope:eqversion:08-10-02

Trust: 0.3

vendor:hitachimodel:cosminexus application server 05-01-/cscope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/hicommand replication monitorscope:eqversion:05-50-02

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.3

Trust: 0.3

vendor:hitachimodel:replication manager softwarescope:eqversion:6.0.0-00

Trust: 0.3

vendor:sunmodel:jre 21scope:eqversion:1.3.1

Trust: 0.3

vendor:ibmmodel:db2 fixpackscope:eqversion:9.19

Trust: 0.3

vendor:hitachimodel:cosminexus developer standard 06-51-/hscope: - version: -

Trust: 0.3

vendor:ibmmodel:os/400 v6r1m0scope: - version: -

Trust: 0.3

vendor:hitachimodel:cosminexus developer standard 06-02-/dscope: - version: -

Trust: 0.3

vendor:hitachimodel:cosminexus developer professional 06-50-/ascope: - version: -

Trust: 0.3

vendor:hitachimodel:replication manager softwarescope:eqversion:6.2-00

Trust: 0.3

vendor:sunmodel:jdk 1.5.0.0 04scope: - version: -

Trust: 0.3

vendor:fujitsumodel:interstage business application server standard editionscope:eqversion:8.0

Trust: 0.3

vendor:hitachimodel:ucosminexus developer professionalscope:eqversion:06-71

Trust: 0.3

vendor:ibmmodel:tivoli foundations for application managerscope:eqversion:1.2

Trust: 0.3

vendor:ibmmodel:db2 fix pack 3ascope:eqversion:9.5

Trust: 0.3

vendor:ibmmodel:tivoli monitoringscope:eqversion:6.0

Trust: 0.3

vendor:ibmmodel:db2 fixpackscope:eqversion:9.110

Trust: 0.3

vendor:hitachimodel:jp1/hicommand tiered storage managerscope:eqversion:05-20

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.0.6

Trust: 0.3

vendor:ibmmodel:cognos business viewpointscope:eqversion:8.0

Trust: 0.3

vendor:redhatmodel:jboss enterprise application platform for rhel serverscope:eqversion:55

Trust: 0.3

vendor:hitachimodel:ucosminexus developer standardscope:eqversion:07-20-02

Trust: 0.3

vendor:hitachimodel:cosminexus developer 05-01-/jscope: - version: -

Trust: 0.3

vendor:hitachimodel:ucosminexus developer standardscope:eqversion:07-00-05

Trust: 0.3

vendor:hitachimodel:cosminexus developer light 06-51-/dscope: - version: -

Trust: 0.3

vendor:ibmmodel:tivoli federated identity managerscope:neversion:6.2.0.9

Trust: 0.3

vendor:ibmmodel:cognos business intelligencescope:eqversion:88.4.1

Trust: 0.3

vendor:hpmodel:hp-ux web server suitescope:eqversion:3.13

Trust: 0.3

vendor:hitachimodel:tuning manager softwarescope:eqversion:6.1-00

Trust: 0.3

vendor:sunmodel:jdk updatescope:eqversion:1.6.04

Trust: 0.3

vendor:hitachimodel:processing kit for xmlscope:eqversion:01-07

Trust: 0.3

vendor:hitachimodel:cosminexus developer 05-01-/dscope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/hicommand tuning managerscope:eqversion:04-00

Trust: 0.3

vendor:hitachimodel:ucosminexus client 06-71-/hscope: - version: -

Trust: 0.3

vendor:hitachimodel:ucosminexus clientscope:eqversion:07-50-10

Trust: 0.3

vendor:hitachimodel:tuning manager software (solaris(spscope:neversion:6.4.0-03

Trust: 0.3

vendor:redhatmodel:enterprise linux for sap serverscope:eqversion:5

Trust: 0.3

vendor:hitachimodel:jp1/hicommand tiered storage managerscope:eqversion:05-50-02

Trust: 0.3

vendor:hitachimodel:jp1/hicommand replication monitorscope:eqversion:05-30

Trust: 0.3

vendor:hpmodel:tru64 unix b-3scope:eqversion:5.1.0

Trust: 0.3

vendor:hitachimodel:processing kit for xml 02-00-/escope: - version: -

Trust: 0.3

vendor:hitachimodel:cosminexus developer standard 06-00-/bscope: - version: -

Trust: 0.3

vendor:ibmmodel:runtimes for java technologyscope:eqversion:5.0

Trust: 0.3

vendor:fujitsumodel:interstage application server enterprise editionscope:eqversion:9.2

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.0.5

Trust: 0.3

vendor:sunmodel:jdk updatescope:eqversion:1.6.013

Trust: 0.3

vendor:sunmodel:jdk 1.3.1 20scope: - version: -

Trust: 0.3

vendor:sunmodel:jdkscope:eqversion:1.5

Trust: 0.3

vendor:hitachimodel:tiered storage manager softwarescope:eqversion:7.0.0-00

Trust: 0.3

vendor:hitachimodel:cosminexus developer 05-05-/gscope: - version: -

Trust: 0.3

vendor:hitachimodel:cosminexus developer light 06-00-/cscope: - version: -

Trust: 0.3

vendor:hitachimodel:tiered storage manager software (solaris(spscope:eqversion:7.0.0-00

Trust: 0.3

vendor:hitachimodel:cosminexus developer light 06-51-/cscope: - version: -

Trust: 0.3

vendor:debianmodel:linux ia-32scope:eqversion:5.0

Trust: 0.3

vendor:mandrakesoftmodel:enterprise server x86 64scope:eqversion:5

Trust: 0.3

vendor:sunmodel:jdk 07scope:eqversion:1.5

Trust: 0.3

vendor:vmwaremodel:vcenter update managerscope:eqversion:4.1

Trust: 0.3

vendor:hitachimodel:cosminexus studio 05-05-/qscope: - version: -

Trust: 0.3

vendor:novellmodel:access managerscope:eqversion:3.1

Trust: 0.3

vendor:hitachimodel:jp1/integrated management service supportscope:eqversion:-08-10-04

Trust: 0.3

vendor:hitachimodel:cosminexus developer professional 06-00-/escope: - version: -

Trust: 0.3

vendor:hitachimodel:cosminexus application server 05-00-/gscope: - version: -

Trust: 0.3

vendor:hitachimodel:replication manager softwarescope:eqversion:7.0.1-01

Trust: 0.3

vendor:hitachimodel:cosminexus developer light 06-00-/gscope: - version: -

Trust: 0.3

vendor:hitachimodel:ucosminexus application server standard hp-uxscope:eqversion:07-10-01

Trust: 0.3

vendor:sunmodel:jre 07scope:eqversion:1.2.2

Trust: 0.3

vendor:fujitsumodel:interstage application server enterprise editionscope:eqversion:9.0

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.5.1

Trust: 0.3

vendor:vmwaremodel:virtualcenter updatescope:eqversion:2.52

Trust: 0.3

vendor:hitachimodel:tuning manager softwarescope:eqversion:0

Trust: 0.3

vendor:hitachimodel:jp1/cm2/network node manager starter edition hp-uxscope:eqversion:25008-00-03

Trust: 0.3

vendor:debianmodel:linux powerpcscope:eqversion:5.0

Trust: 0.3

vendor:ibmmodel:rational clearquestscope:eqversion:7.0.1

Trust: 0.3

vendor:hitachimodel:cosminexus application server 05-00-/pscope: - version: -

Trust: 0.3

vendor:hitachimodel:cosminexus developer 05-05-/dscope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/hicommand global link availability managerscope:eqversion:05-20

Trust: 0.3

vendor:ibmmodel:tivoli monitoringscope:eqversion:6.2.2

Trust: 0.3

vendor:hitachimodel:provisioning manager software (linux(slesscope:eqversion:6.3.0-00

Trust: 0.3

vendor:hitachimodel:cosminexus application serverscope:eqversion:05-01

Trust: 0.3

vendor:ibmmodel:rational clearcasescope:eqversion:7.0.1.4

Trust: 0.3

vendor:sunmodel:jdk update13scope:eqversion:1.5.0

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.5.5

Trust: 0.3

vendor:ibmmodel:tivoli netcool portalscope:eqversion:2.1.1

Trust: 0.3

vendor:hitachimodel:jp1/hicommand replication monitorscope:eqversion:04-00

Trust: 0.3

vendor:hitachimodel:ucosminexus application server standard 06-70-/a (windows(ipscope: - version: -

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:6.0.12

Trust: 0.3

vendor:hitachimodel:jp1/cm2/network node manager starter ed enterprise (hp-ux(pa-rscope:eqversion:08-00-01

Trust: 0.3

vendor:ibmmodel:tivoli directory serverscope:eqversion:6.3

Trust: 0.3

vendor:ibmmodel:tivoli workload schedulerscope:eqversion:8.4

Trust: 0.3

vendor:ibmmodel:cognos metricsscope:eqversion:8.0

Trust: 0.3

vendor:oraclemodel:jrockit r28.0.1scope: - version: -

Trust: 0.3

vendor:ibmmodel:tivoli netview for z/osscope:eqversion:5.4.0

Trust: 0.3

vendor:sunmodel:jdk update19scope:eqversion:1.5.0

Trust: 0.3

vendor:fujitsumodel:interstage application server plusscope:eqversion:5.0.1

Trust: 0.3

vendor:hpmodel:systems insight managerscope:eqversion:6.1

Trust: 0.3

vendor:hitachimodel:processing kit for xml 01-05-/b (windows(enscope: - version: -

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:6.1.21

Trust: 0.3

vendor:hitachimodel:cosminexus developer light 06-02-/fscope: - version: -

Trust: 0.3

vendor:ibmmodel:tivoli federated identity manager business gatewayscope:eqversion:6.2.1

Trust: 0.3

vendor:susemodel:linux enterprise desktop sp3scope:eqversion:10

Trust: 0.3

vendor:hitachimodel:ucosminexus service architectscope:eqversion:07-00-02

Trust: 0.3

vendor:hitachimodel:jp1/hicommand replication monitorscope:eqversion:05-40

Trust: 0.3

vendor:hitachimodel:cosminexus developer 05-05-/fscope: - version: -

Trust: 0.3

vendor:hitachimodel:cosminexus developer professionalscope:eqversion:06-51

Trust: 0.3

vendor:hitachimodel:jp1/hicommand replication monitorscope:eqversion:05-10

Trust: 0.3

vendor:hitachimodel:cosminexus developer professionalscope:eqversion:06-00

Trust: 0.3

vendor:hitachimodel:jp1/hicommand global link availability managerscope:eqversion:05-60-01

Trust: 0.3

vendor:hitachimodel:jp1/hicommand provisioning manager (solaris(sparcscope:eqversion:02-30

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:6.0.30

Trust: 0.3

vendor:attachmatemodel:reflectionscope:eqversion:x2011

Trust: 0.3

vendor:hitachimodel:ucosminexus developer light 06-71-/ascope: - version: -

Trust: 0.3

vendor:ibmmodel:tivoli netcool portalscope:eqversion:2.1.2

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:6.0.16

Trust: 0.3

vendor:ibmmodel:totalstorage ds8300scope:eqversion:0

Trust: 0.3

vendor:fujitsumodel:interstage application server standard-j editionscope:eqversion:9.1

Trust: 0.3

vendor:hitachimodel:cosminexus developer standard 06-50-/cscope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/hicommand global link availability managerscope:eqversion:05-00

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:6.0.31

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.0.3

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.0.31

Trust: 0.3

vendor:vmwaremodel:virtualcenter 2.5.update buildscope:eqversion:31

Trust: 0.3

vendor:hitachimodel:ucosminexus developer professionalscope:eqversion:07-00-02

Trust: 0.3

vendor:hitachimodel:cosminexus developer light 06-50-/fscope: - version: -

Trust: 0.3

vendor:redhatmodel:jboss enterprise web server for rhel asscope:eqversion:41.0

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.5.30

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:6.1.14

Trust: 0.3

vendor:hitachimodel:cosminexus developer professional 06-02-/ascope: - version: -

Trust: 0.3

vendor:hitachimodel:ucosminexus developer lightscope:eqversion:06-71

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:6.1.19

Trust: 0.3

vendor:sunmodel:jdkscope:eqversion:1.3.117

Trust: 0.3

vendor:ibmmodel:cics transaction gatewayscope:eqversion:6.0

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:9.10

Trust: 0.3

vendor:hitachimodel:ucosminexus developer professionalscope:eqversion:0

Trust: 0.3

vendor:vmwaremodel:virtualcenterscope:eqversion:2.5

Trust: 0.3

vendor:oraclemodel:jrockit r27.6.7scope: - version: -

Trust: 0.3

vendor:hitachimodel:device manager softwarescope:eqversion:6.4.0-07

Trust: 0.3

vendor:sunmodel:jdk bscope:eqversion:1.1.7

Trust: 0.3

vendor:hitachimodel:jp1/cm2/network node manager starter ed enterprise (hp-ux(pa-riscscope:eqversion:08-10

Trust: 0.3

vendor:hitachimodel:ucosminexus service platformscope:eqversion:07-50-10

Trust: 0.3

vendor:vmwaremodel:vcenterscope:eqversion:4.0

Trust: 0.3

vendor:hitachimodel:ucosminexus developer standard 06-71-/fscope: - version: -

Trust: 0.3

vendor:sunmodel:jre 10-b03scope:eqversion:1.4.2

Trust: 0.3

vendor:oraclemodel:jrockit r27.6.0scope: - version: -

Trust: 0.3

vendor:hpmodel:hp-ux b.11.31scope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/integrated management service supportscope:eqversion:-08-10-02

Trust: 0.3

vendor:hitachimodel:cosminexus developer professional 06-51-/ascope: - version: -

Trust: 0.3

vendor:hpmodel:tru64 unix b-4scope:eqversion:5.1.0

Trust: 0.3

vendor:sunmodel:jre 07scope:eqversion:1.5

Trust: 0.3

vendor:hitachimodel:jp1/hicommand tiered storage managerscope:eqversion:05-40

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.8

Trust: 0.3

vendor:hitachimodel:cosminexus developer professional 06-02-/bscope: - version: -

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:6.1.23

Trust: 0.3

vendor:hitachimodel:jp1/hicommand tiered storage managerscope:eqversion:05-10

Trust: 0.3

vendor:hitachimodel:ucosminexus service architectscope:eqversion:07-20

Trust: 0.3

vendor:ibmmodel:rational clearquestscope:eqversion:7.1.2.1

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.0.4

Trust: 0.3

vendor:hitachimodel:cosminexus developer light 06-00-/bscope: - version: -

Trust: 0.3

vendor:ibmmodel:rational clearquestscope:eqversion:7.0.1.1

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:6.1.10

Trust: 0.3

vendor:hitachimodel:replication manager softwarescope:neversion:7.3.0-00

Trust: 0.3

vendor:hitachimodel:cosminexus application server 05-01-/escope: - version: -

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:6.1.11

Trust: 0.3

vendor:hitachimodel:jp1/cm2/network node manager starter ed enterprise )scope:eqversion:08-10

Trust: 0.3

vendor:hitachimodel:jp1/integrated management service supportscope:eqversion:-08-10-03

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:6.0.13

Trust: 0.3

vendor:hitachimodel:cosminexus application server 05-01-/jscope: - version: -

Trust: 0.3

vendor:hitachimodel:tuning manager softwarescope:eqversion:7.0

Trust: 0.3

vendor:ibmmodel:tivoli storage managerscope:eqversion:6.1

Trust: 0.3

vendor:hitachimodel:cosminexus developer standardscope:eqversion:06-51

Trust: 0.3

vendor:ibmmodel:cognos planningscope:eqversion:10.0

Trust: 0.3

vendor:hitachimodel:jp1/cm2/network node manager starter edition (hp-ux(pa-riscscope:eqversion:25008-00

Trust: 0.3

vendor:avayamodel:aura conferencing sp1 standardscope:eqversion:6.0

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.5.17

Trust: 0.3

vendor:hitachimodel:provisioning manager software (linux(slesscope:eqversion:6.4.0-07

Trust: 0.3

vendor:hitachimodel:jp1/cm2/network node manager starter edition hp-ux(pa-riscope:eqversion:25008-10-12

Trust: 0.3

vendor:hitachimodel:ucosminexus client 06-71-/dscope: - version: -

Trust: 0.3

vendor:hitachimodel:cosminexus developer standardscope:eqversion:06-00

Trust: 0.3

vendor:ibmmodel:tivoli netcool reporterscope:eqversion:2.2

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.1

Trust: 0.3

vendor:hitachimodel:ucosminexus application server standardscope:eqversion:07-50-02

Trust: 0.3

vendor:hitachimodel:ucosminexus application server standardscope:eqversion:07-20

Trust: 0.3

vendor:ibmmodel:cics transaction gatewayscope:eqversion:7.2

Trust: 0.3

vendor:hitachimodel:ucosminexus service platformscope:eqversion:07-00-12

Trust: 0.3

vendor:hitachimodel:ucosminexus application server enterprisescope:eqversion:07-10-08

Trust: 0.3

vendor:ibmmodel:rational clearquestscope:eqversion:7.1.0.2

Trust: 0.3

vendor:ibmmodel:rational clearquestscope:eqversion:7.1.1.2

Trust: 0.3

vendor:hitachimodel:processing kit for xmlscope:eqversion:01-00

Trust: 0.3

vendor:susemodel:linux enterprise desktop sp1scope:eqversion:11

Trust: 0.3

vendor:hitachimodel:tiered storage manager software (linux(rhelscope:eqversion:7.0.0-00

Trust: 0.3

vendor:hitachimodel:jp1/performance management web consolescope:eqversion:-0

Trust: 0.3

vendor:hitachimodel:tuning manager softwarescope:neversion:6.4.0-03

Trust: 0.3

vendor:hitachimodel:ucosminexus developer standardscope:eqversion:07-00-03

Trust: 0.3

vendor:sunmodel:jre 04scope:eqversion:1.3

Trust: 0.3

vendor:hitachimodel:ucosminexus developer professional 06-71-/hscope: - version: -

Trust: 0.3

vendor:hitachimodel:ucosminexus client 06-71-/fscope: - version: -

Trust: 0.3

vendor:hpmodel:systems insight managerscope:eqversion:4.2

Trust: 0.3

vendor:hitachimodel:provisioning manager software (linux(rhelscope:eqversion:6.4.0-07

Trust: 0.3

vendor:sunmodel:jdk 02scope:eqversion:1.4.2

Trust: 0.3

vendor:attachmatemodel:reflection for secure it unix clientscope:eqversion:6.0

Trust: 0.3

vendor:hitachimodel:ucosminexus service architectscope:eqversion:07-50

Trust: 0.3

vendor:ibmmodel:rational clearquestscope:neversion:7.1.2.2

Trust: 0.3

vendor:hitachimodel:provisioning manager softwarescope:eqversion:6.4.0-07

Trust: 0.3

vendor:hitachimodel:ucosminexus developer professional 06-71-/fscope: - version: -

Trust: 0.3

vendor:redhatmodel:enterprise linux desktop optionalscope:eqversion:6

Trust: 0.3

vendor:redhatmodel:enterprise linux hpc node supplementaryscope:eqversion:6

Trust: 0.3

vendor:redhatmodel:enterprise linux desktop supplementary clientscope:eqversion:5

Trust: 0.3

vendor:hitachimodel:ucosminexus developer standard 06-70-/cscope: - version: -

Trust: 0.3

vendor:hitachimodel:it operations analyzerscope:eqversion:02-51

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:10.04

Trust: 0.3

vendor:hitachimodel:tuning manager software )scope:eqversion:7.0

Trust: 0.3

vendor:sunmodel:jdk update17scope:eqversion:1.5.0

Trust: 0.3

vendor:hitachimodel:ucosminexus developer professional 06-70-/fscope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/cm2/network node manager iscope:eqversion:0

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:6.0.26

Trust: 0.3

vendor:hitachimodel:cosminexus developer 05-05-/cscope: - version: -

Trust: 0.3

vendor:hitachimodel:ucosminexus developer standardscope:eqversion:07-50-10

Trust: 0.3

vendor:ibmmodel:runtimes for java technology sr12 fpscope:neversion:5.04

Trust: 0.3

vendor:sunmodel:jdkscope:eqversion:1.3.119

Trust: 0.3

vendor:sunmodel:sdkscope:eqversion:1.4.221

Trust: 0.3

vendor:sunmodel:sdk 02scope:eqversion:1.4.2

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:6.0.8

Trust: 0.3

vendor:hitachimodel:cosminexus application server standard 06-51-/gscope: - version: -

Trust: 0.3

vendor:hitachimodel:ucosminexus application server standardscope:eqversion:06-72(*1)

Trust: 0.3

vendor:ibmmodel:tivoli composite application managerscope:eqversion:6.2

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.0.1

Trust: 0.3

vendor:hpmodel:hp-ux web server suitescope:eqversion:3.12

Trust: 0.3

vendor:hitachimodel:cosminexus developer standard 06-50-/ascope: - version: -

Trust: 0.3

vendor:sunmodel:jdk 0 03scope:eqversion:1.5

Trust: 0.3

vendor:ibmmodel:cognos queryscope:eqversion:7.4

Trust: 0.3

vendor:hitachimodel:cosminexus developer professional 06-50-/cscope: - version: -

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.1

Trust: 0.3

vendor:sunmodel:jdk update20scope:eqversion:1.5.0

Trust: 0.3

vendor:hitachimodel:jp1/cm2/snmp system observerscope:eqversion:0

Trust: 0.3

vendor:hitachimodel:jp1/serverconductor/control managerscope:eqversion:0

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:7.0.2

Trust: 0.3

vendor:hpmodel:openvms secure web serverscope:eqversion:1.1-1

Trust: 0.3

vendor:hitachimodel:cosminexus developer professional 06-51-/iscope: - version: -

Trust: 0.3

vendor:avayamodel:aura conferencing standardscope:eqversion:6.0

Trust: 0.3

vendor:hitachimodel:tiered storage manager software (solaris(spscope:neversion:6.4.0-08

Trust: 0.3

vendor:ibmmodel:cognos financescope:eqversion:7.0

Trust: 0.3

vendor:fujitsumodel:interstage application server enterprise editionscope:eqversion:7.0.1

Trust: 0.3

vendor:hitachimodel:jp1/cm2/network node manager starter edition windowsscope:eqversion:25008-00-03

Trust: 0.3

vendor:hitachimodel:ucosminexus application server standard 06-70-/mscope: - version: -

Trust: 0.3

vendor:hitachimodel:cosminexus client 06-00-/iscope: - version: -

Trust: 0.3

vendor:hitachimodel:cosminexus application server 05-00-/sscope: - version: -

Trust: 0.3

vendor:debianmodel:linux armscope:eqversion:5.0

Trust: 0.3

vendor:hitachimodel:ucosminexus application server enterprise 06-72-/b )scope: - version: -

Trust: 0.3

vendor:susemodel:linux enterprise for sap applications sp1scope:eqversion:11

Trust: 0.3

vendor:hitachimodel:device manager software (solaris(spscope:eqversion:6.4.0-07

Trust: 0.3

vendor:debianmodel:linux hppascope:eqversion:5.0

Trust: 0.3

vendor:hitachimodel:ucosminexus application server enterprisescope:eqversion:07-00-02

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:6.0.3

Trust: 0.3

vendor:hitachimodel:replication manager software (solaris(spscope:eqversion:6.0.0-00

Trust: 0.3

vendor:hitachimodel:ucosminexus operatorscope:eqversion:07-60

Trust: 0.3

vendor:avayamodel:proactive contactscope:eqversion:3.0.4

Trust: 0.3

vendor:hitachimodel:global link manager softwarescope:eqversion:6.2-00

Trust: 0.3

vendor:hitachimodel:processing kit for xmlscope:eqversion:0

Trust: 0.3

vendor:sunmodel:jdk 20scope:eqversion:1.3.1

Trust: 0.3

vendor:hitachimodel:jp1/hicommand replication monitorscope:eqversion:05-50-03

Trust: 0.3

vendor:hitachimodel:cosminexus developer light 06-50-/cscope: - version: -

Trust: 0.3

vendor:hitachimodel:device manager software (linux(rhelscope:eqversion:7.0.0-00

Trust: 0.3

vendor:vmwaremodel:vcenter updatescope:neversion:4.12

Trust: 0.3

vendor:hitachimodel:cosminexus developer 05-05-/bscope: - version: -

Trust: 0.3

vendor:hitachimodel:ucosminexus application server enterprise 06-70-/oscope: - version: -

Trust: 0.3

vendor:hitachimodel:cosminexus developer 05-01-/iscope: - version: -

Trust: 0.3

vendor:hitachimodel:cosminexus developer professional 06-02-/cscope: - version: -

Trust: 0.3

vendor:hitachimodel:cosminexus developer standard 06-00-/gscope: - version: -

Trust: 0.3

vendor:redhatmodel:jboss enterprise soa platform cp04scope:eqversion:4.3

Trust: 0.3

vendor:ibmmodel:rational clearquestscope:eqversion:7.04

Trust: 0.3

vendor:sunmodel:jdk updatescope:eqversion:1.6.06

Trust: 0.3

vendor:ibmmodel:tivoli workload scheduler for applicationsscope:eqversion:8.0

Trust: 0.3

vendor:hitachimodel:cosminexus developer 05-05-/lscope: - version: -

Trust: 0.3

vendor:ibmmodel:cognos powerplayscope:eqversion:8.0

Trust: 0.3

vendor:sunmodel:sdk 01scope:eqversion:1.4.2

Trust: 0.3

vendor:hitachimodel:processing kit for xml (windows(engliscope:eqversion:01-05

Trust: 0.3

vendor:hitachimodel:ucosminexus service architectscope:eqversion:07-20-01

Trust: 0.3

vendor:hitachimodel:ucosminexus application server standardscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:tivoli netcool performance manager technology packscope:eqversion:0

Trust: 0.3

vendor:hitachimodel:jp1/hicommand provisioning manager (solaris(sparcscope:eqversion:05-90

Trust: 0.3

vendor:sunmodel:jre 1.5.0 09-b03scope: - version: -

Trust: 0.3

vendor:hpmodel:systems insight manager sp2scope:eqversion:4.2

Trust: 0.3

vendor:hitachimodel:job management partner 1/performance management web consolescope:eqversion:-0

Trust: 0.3

vendor:fujitsumodel:interstage application server enterprise editionscope:eqversion:9.1

Trust: 0.3

vendor:hitachimodel:device manager software (linux(slesscope:eqversion:7.0.0-00

Trust: 0.3

vendor:hitachimodel:device manager software )scope:eqversion:6.0-06

Trust: 0.3

vendor:ibmmodel:tivoli federated identity manager business gatewayscope:eqversion:6.2

Trust: 0.3

vendor:hitachimodel:cosminexus developer standard 06-51-/fscope: - version: -

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:10.10

Trust: 0.3

vendor:hitachimodel:cosminexus developer light 06-02-/bscope: - version: -

Trust: 0.3

vendor:sunmodel:jdkscope:eqversion:1.3

Trust: 0.3

vendor:hitachimodel:cosminexus developer light 06-02-/cscope: - version: -

Trust: 0.3

vendor:ibmmodel:tivoli configuration managerscope:eqversion:4.3.1

Trust: 0.3

vendor:hitachimodel:device manager software (solarisscope:eqversion:6.1.1-04(x64))

Trust: 0.3

vendor:susemodel:linux enterprise sp4scope:eqversion:10

Trust: 0.3

vendor:ibmmodel:rational clearcasescope:neversion:7.1.1.5

Trust: 0.3

vendor:hitachimodel:ucosminexus application server enterprisescope:eqversion:07-03-03

Trust: 0.3

vendor:hitachimodel:device manager software (linux(rhelscope:neversion:6.4.0-08

Trust: 0.3

vendor:redhatmodel:jboss enterprise web server for rhel serverscope:eqversion:51.0

Trust: 0.3

vendor:hpmodel:systems insight managerscope:eqversion:5.0

Trust: 0.3

vendor:hitachimodel:ucosminexus clientscope:eqversion:07-00

Trust: 0.3

vendor:mandrivamodel:linux mandrake x86 64scope:eqversion:2010.1

Trust: 0.3

vendor:hitachimodel:ucosminexus developer professionalscope:eqversion:07-20-01

Trust: 0.3

vendor:sunmodel:jdk 13scope:eqversion:1.1.8

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.5.12

Trust: 0.3

vendor:hitachimodel:cosminexus application server 05-01-/ascope: - version: -

Trust: 0.3

vendor:hitachimodel:provisioning manager software (linux(rhelscope:neversion:6.4.0-08

Trust: 0.3

vendor:hitachimodel:tuning manager softwarescope:eqversion:6.2-01

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:9.10

Trust: 0.3

vendor:sunmodel:jdk 08scope:eqversion:1.3.1

Trust: 0.3

vendor:hitachimodel:ucosminexus application server enterprisescope:eqversion:07-50-02

Trust: 0.3

vendor:hitachimodel:ucosminexus application server enterprisescope:eqversion:07-20

Trust: 0.3

vendor:novellmodel:identity manager analyzerscope:eqversion:1.2

Trust: 0.3

vendor:hpmodel:openvmsscope:eqversion:0

Trust: 0.3

vendor:hitachimodel:ucosminexus operatorscope:eqversion:07-00-05

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.5.27

Trust: 0.3

vendor:attachmatemodel:reflection for secure it unix server sp1scope:neversion:7.2

Trust: 0.3

vendor:vmwaremodel:virtualcenter updatescope:eqversion:2.54

Trust: 0.3

vendor:hpmodel:systems insight manager sp1scope:eqversion:5.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.2

Trust: 0.3

vendor:hitachimodel:ucosminexus developer professionalscope:eqversion:06-70

Trust: 0.3

vendor:ibmmodel:tivoli federated identity manager business gatewayscope:neversion:6.2.0.9

Trust: 0.3

vendor:novellmodel:identity manager designerscope:eqversion:3.5.1

Trust: 0.3

vendor:hpmodel:openvms secure web serverscope:eqversion:2.2

Trust: 0.3

vendor:fujitsumodel:interstage application server standard-j editionscope:eqversion:8.0

Trust: 0.3

vendor:oraclemodel:jrockit r27.1.0scope: - version: -

Trust: 0.3

vendor:ibmmodel:application manager for smart businessscope:eqversion:1.2.1

Trust: 0.3

vendor:hitachimodel:ucosminexus developer professionalscope:eqversion:07-03-03

Trust: 0.3

vendor:hitachimodel:ucosminexus application server standard 06-70-/kscope: - version: -

Trust: 0.3

vendor:hitachimodel:ucosminexus developer standard 06-71-/dscope: - version: -

Trust: 0.3

vendor:redhatmodel:enterprise linux supplementary serverscope:eqversion:5

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:6.1.18

Trust: 0.3

vendor:ibmmodel:rational clearquestscope:eqversion:7.0.1.4

Trust: 0.3

vendor:hitachimodel:device manager software )scope:eqversion:6.0-00

Trust: 0.3

vendor:hitachimodel:cosminexus application server standard 06-51-/fscope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/hicommand tiered storage managerscope:eqversion:05-90

Trust: 0.3

vendor:hitachimodel:device manager softwarescope:eqversion:0

Trust: 0.3

vendor:redhatmodel:jboss enterprise application platform el5scope:eqversion:4.3

Trust: 0.3

vendor:hitachimodel:ucosminexus developer standardscope:eqversion:07-60

Trust: 0.3

vendor:sunmodel:jdkscope:eqversion:1.3.127

Trust: 0.3

vendor:sunmodel:jre 18scope:eqversion:1.3.1

Trust: 0.3

vendor:sunmodel:jdkscope:eqversion:1.3.111

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:6.1.0.31

Trust: 0.3

vendor:sunmodel:jdkscope:eqversion:1.3.118

Trust: 0.3

vendor:redhatmodel:enterprise linux workstationscope:eqversion:6

Trust: 0.3

vendor:hitachimodel:cosminexus studio 05-05-/pscope: - version: -

Trust: 0.3

vendor:hitachimodel:provisioning manager software (linux(rhelscope:eqversion:6.0.0-00

Trust: 0.3

vendor:sunmodel:jdkscope:eqversion:1.3.124

Trust: 0.3

vendor:redhatmodel:enterprise linux desktop clientscope:eqversion:5

Trust: 0.3

vendor:fujitsumodel:interstage software quality analyzerscope:eqversion:10.0

Trust: 0.3

vendor:hitachimodel:device manager softwarescope:neversion:7.1.0-00

Trust: 0.3

vendor:oraclemodel:jrockit r27.6.6scope: - version: -

Trust: 0.3

vendor:hpmodel:systems insight managerscope:eqversion:6.0.0.96

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6

Trust: 0.3

vendor:sunmodel:jdk updatescope:eqversion:1.6.012

Trust: 0.3

vendor:hitachimodel:jp1/hicommand tuning managerscope:eqversion:05-20

Trust: 0.3

vendor:sunmodel:jre 05ascope:eqversion:1.2.2

Trust: 0.3

vendor:hitachimodel:it operations analyzerscope:eqversion:02-51-01

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.5.16

Trust: 0.3

vendor:hitachimodel:tuning manager softwarescope:eqversion:6.402

Trust: 0.3

vendor:oraclemodel:jrockit r27.6.8scope: - version: -

Trust: 0.3

vendor:fujitsumodel:interstage application server enterprise editionscope:eqversion:6.0

Trust: 0.3

vendor:hitachimodel:cosminexus developer light 06-51-/hscope: - version: -

Trust: 0.3

vendor:ibmmodel:netcool/omnibus fix packscope:neversion:7.3.120

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.0.19

Trust: 0.3

vendor:debianmodel:linuxscope:eqversion:5.0

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:6.1.0.33

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:6.0.5

Trust: 0.3

vendor:hitachimodel:tiered storage manager software (linux(slesscope:eqversion:7.0.1-02

Trust: 0.3

vendor:apachemodel:tomcatscope:neversion:6.0.32

Trust: 0.3

vendor:sunmodel:jre 003scope:eqversion:1.2.2

Trust: 0.3

vendor:sunmodel:jdk 15scope:eqversion:1.1.8

Trust: 0.3

vendor:hitachimodel:ucosminexus application server standardscope:eqversion:07-20-02

Trust: 0.3

vendor:ibmmodel:tivoli monitoringscope:eqversion:6.2

Trust: 0.3

vendor:hitachimodel:ucosminexus application server enterprise hp-ux )scope:eqversion:07-00

Trust: 0.3

vendor:hitachimodel:cosminexus developer professional 06-51-/jscope: - version: -

Trust: 0.3

vendor:hitachimodel:cosminexus application server 05-01-/dscope: - version: -

Trust: 0.3

vendor:redhatmodel:jboss enterprise application platform for rhel 4esscope:eqversion:5

Trust: 0.3

vendor:hitachimodel:ucosminexus developer light 06-70-/fscope: - version: -

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5

Trust: 0.3

vendor:debianmodel:linux alphascope:eqversion:5.0

Trust: 0.3

vendor:hitachimodel:ucosminexus developer light 06-70-/bscope: - version: -

Trust: 0.3

vendor:susemodel:linux enterprise server sp3scope:eqversion:10

Trust: 0.3

vendor:ubuntumodel:linux armscope:eqversion:10.04

Trust: 0.3

vendor:attachmatemodel:reflection for secure it windows server sp1scope:neversion:7.2

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:6.1.17

Trust: 0.3

vendor:hitachimodel:ucosminexus clientscope:eqversion:06-71

Trust: 0.3

vendor:hitachimodel:jp1/integrated management service supportscope:eqversion:-08-11-02

Trust: 0.3

vendor:hitachimodel:ucosminexus application server enterprise hp-ux )scope:eqversion:07-10

Trust: 0.3

vendor:sunmodel:jre 099scope:eqversion:1.1.8

Trust: 0.3

vendor:hitachimodel:ucosminexus operatorscope:eqversion:07-10

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:6.1.12

Trust: 0.3

vendor:hitachimodel:jp1/cm2/network node manager starter edition enterprisescope:eqversion:08-10-02

Trust: 0.3

vendor:hitachimodel:tiered storage manager software (linux(slesscope:eqversion:6.3.0-00

Trust: 0.3

vendor:sunmodel:jre betascope:eqversion:1.5.0

Trust: 0.3

vendor:hitachimodel:ucosminexus service architectscope:eqversion:07-00-01

Trust: 0.3

vendor:hitachimodel:jp1/integrated management service supportscope:eqversion:-08-51-01

Trust: 0.3

vendor:hitachimodel:jp1/hicommand global link availability managerscope:eqversion:05-70

Trust: 0.3

vendor:ibmmodel:cognos visualizerscope:eqversion:7.0

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.5.11

Trust: 0.3

vendor:hitachimodel:cosminexus developer light 06-02-/dscope: - version: -

Trust: 0.3

vendor:hitachimodel:cosminexus developer light 06-02-/gscope: - version: -

Trust: 0.3

vendor:hitachimodel:it operations directorscope:eqversion:02-50-01

Trust: 0.3

vendor:oraclemodel:jrockit r27.6.4scope: - version: -

Trust: 0.3

vendor:ibmmodel:cognos financial performance analyticsscope:eqversion:8.0

Trust: 0.3

vendor:ibmmodel:tivoli storage productivity center fix packscope:neversion:4.2.14

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:11.2

Trust: 0.3

vendor:hitachimodel:cosminexus developer 05-01-/bscope: - version: -

Trust: 0.3

vendor:sunmodel:jdk updatescope:eqversion:1.6.015

Trust: 0.3

vendor:hitachimodel:jp1/hicommand replication monitorscope:eqversion:05-20

Trust: 0.3

vendor:hitachimodel:cosminexus developer standard 06-00-/escope: - version: -

Trust: 0.3

vendor:hitachimodel:cosminexus developer light 06-51-/escope: - version: -

Trust: 0.3

vendor:hitachimodel:cosminexus developer 05-01-/lscope: - version: -

Trust: 0.3

vendor:sunmodel:jdkscope:eqversion:1.3.106

Trust: 0.3

vendor:hitachimodel:cosminexus studio web edition 04-00-/ascope:eqversion: -

Trust: 0.3

vendor:ibmmodel:cognos powerplayscope:eqversion:7.0

Trust: 0.3

vendor:hitachimodel:cosminexus developer 05-05-/qscope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/cm2/network node manager starter edition )scope:eqversion:25008-10

Trust: 0.3

vendor:mandrivamodel:linux mandrakescope:eqversion:2010.1

Trust: 0.3

vendor:sunmodel:sdkscope:eqversion:1.4.219

Trust: 0.3

vendor:debianmodel:linux ia-64scope:eqversion:5.0

Trust: 0.3

vendor:hitachimodel:cosminexus application server 05-01-/hscope: - version: -

Trust: 0.3

vendor:ibmmodel:cognos noticecastscope:eqversion:7.0

Trust: 0.3

vendor:sunmodel:jdkscope:eqversion:1.3.125

Trust: 0.3

vendor:novellmodel:sentinel support packscope:eqversion:6.12

Trust: 0.3

vendor:avayamodel:aura system platformscope:eqversion:1.0

Trust: 0.3

vendor:hitachimodel:ucosminexus developer professionalscope:eqversion:07-00-01

Trust: 0.3

vendor:hitachimodel:cosminexus developer standard 06-51-/iscope: - version: -

Trust: 0.3

vendor:ibmmodel:tivoli storage managerscope:eqversion:6.2

Trust: 0.3

vendor:hitachimodel:cosminexus application server standard 06-50-/c (hp-ux(scope: - version: -

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:7.0.4

Trust: 0.3

vendor:hpmodel:hp-ux b.11.23scope: - version: -

Trust: 0.3

vendor:fujitsumodel:interstage application server plusscope:eqversion:7.0

Trust: 0.3

vendor:ibmmodel:db2scope:eqversion:9.7

Trust: 0.3

vendor:hitachimodel:ucosminexus application server enterprisescope:eqversion:07-20-01

Trust: 0.3

vendor:hpmodel:systems insight managerscope:neversion:7.0

Trust: 0.3

vendor:hitachimodel:cosminexus application server 05-00-/escope: - version: -

Trust: 0.3

vendor:sunmodel:jrescope:eqversion:1.1.6

Trust: 0.3

vendor:hitachimodel:device manager softwarescope:eqversion:7.0.0-00

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.5

Trust: 0.3

vendor:sunmodel:jdk 1.4.2 11scope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/hicommand tuning managerscope:eqversion:05-30

Trust: 0.3

vendor:hitachimodel:jp1/hicommand replication monitorscope:eqversion:05-60-01

Trust: 0.3

vendor:sunmodel:jre 14scope:eqversion:1.1.8

Trust: 0.3

vendor:hitachimodel:ucosminexus developer light 06-70-/dscope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/cm2/network node manager starter edition solarisscope:eqversion:25008-00-03

Trust: 0.3

vendor:ibmmodel:rational clearcasescope:eqversion:7.0.1.2

Trust: 0.3

vendor:sunmodel:jre 13scope:eqversion:1.1.8

Trust: 0.3

vendor:hitachimodel:ucosminexus application server enterprise 06-70-/g )scope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/automatic job management system web operation assistantscope:eqversion:3-0

Trust: 0.3

vendor:sunmodel:jdk 12scope:eqversion:1.1.8

Trust: 0.3

vendor:ibmmodel:tivoli directory serverscope:eqversion:6.2

Trust: 0.3

vendor:redhatmodel:enterprise linux workstation optionalscope:eqversion:6

Trust: 0.3

vendor:ibmmodel:cognos metricsscope:eqversion:10.0

Trust: 0.3

vendor:hitachimodel:ucosminexus operatorscope:eqversion:07-03-03

Trust: 0.3

vendor:hitachimodel:jp1/it resource management-managerscope:eqversion:0

Trust: 0.3

vendor:hitachimodel:ucosminexus developer lightscope:eqversion:06-70

Trust: 0.3

vendor:hitachimodel:cosminexus developer professional 06-51-/kscope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/hicommand replication monitorscope:eqversion:05-00

Trust: 0.3

vendor:attachmatemodel:reflection for secure it windows serverscope:eqversion:7.2

Trust: 0.3

vendor:sunmodel:jdk 11scope:eqversion:1.1.8

Trust: 0.3

vendor:hitachimodel:jp1/cm2/network node manager starter ed enterprise )scope:eqversion:08-00

Trust: 0.3

vendor:hitachimodel:jp1/cm2/network node manager starter edition (hp-ux(pa-rscope:eqversion:25008-00-02

Trust: 0.3

vendor:hitachimodel:provisioning manager softwarescope:neversion:6.4.0-08

Trust: 0.3

vendor:sunmodel:jdk update23scope:eqversion:1.5.0

Trust: 0.3

vendor:susemodel:linux enterprise server sp1scope:eqversion:11

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.3

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.0.12

Trust: 0.3

vendor:sunmodel:jdk updatescope:eqversion:1.6.03

Trust: 0.3

vendor:ibmmodel:cognos web servicesscope:eqversion:7.0

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.0.16

Trust: 0.3

vendor:ubuntumodel:linux armscope:eqversion:10.10

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.6

Trust: 0.3

vendor:sunmodel:jre 28scope:eqversion:1.4.2

Trust: 0.3

vendor:hitachimodel:device manager software (solaris(spscope:neversion:7.1.0-00

Trust: 0.3

vendor:hitachimodel:ucosminexus application server enterprisescope:eqversion:06-72

Trust: 0.3

vendor:hitachimodel:cosminexus studio standard editionscope:eqversion:4

Trust: 0.3

vendor:ibmmodel:db2 fixpakscope:eqversion:9.55

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.5.4

Trust: 0.3

vendor:ibmmodel:db2 fix packscope:eqversion:9.51

Trust: 0.3

vendor:hitachimodel:cosminexus developer standard 06-50-/escope: - version: -

Trust: 0.3

vendor:hitachimodel:ucosminexus developer standardscope:eqversion:07-00

Trust: 0.3

vendor:hitachimodel:cosminexus developerscope:eqversion:05-01

Trust: 0.3

vendor:hitachimodel:tiered storage manager softwarescope:eqversion:0

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.5.9

Trust: 0.3

vendor:hitachimodel:cosminexus application server 05-00-/qscope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/cm2/network node manager starter ed enterprise (hp-ux(pa-rscope:eqversion:08-10-01

Trust: 0.3

vendor:hitachimodel:ucosminexus developer standardscope:eqversion:0

Trust: 0.3

vendor:attachmatemodel:reflection for secure it unix serverscope:eqversion:6.0

Trust: 0.3

vendor:hitachimodel:global link manager softwarescope:eqversion:6.1-00

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.5.24

Trust: 0.3

vendor:ibmmodel:rational clearquestscope:eqversion:7.1

Trust: 0.3

vendor:hitachimodel:cosminexus developer professional 06-00-/fscope: - version: -

Trust: 0.3

vendor:novellmodel:sentinel support pack hscope:eqversion:6.12

Trust: 0.3

vendor:hitachimodel:replication manager software (linux(slesscope:eqversion:7.0.0-00

Trust: 0.3

vendor:hitachimodel:ucosminexus developer standardscope:eqversion:07-10

Trust: 0.3

vendor:hitachimodel:ucosminexus application server standard 06-70-/iscope: - version: -

Trust: 0.3

vendor:ibmmodel:tivoli netcool performance managerscope:eqversion:1.3

Trust: 0.3

vendor:hitachimodel:cosminexus client 06-50-/fscope: - version: -

Trust: 0.3

vendor:hitachimodel:tiered storage manager software (linux(slesscope:eqversion:6.4.0-07

Trust: 0.3

vendor:hitachimodel:cosminexus studioscope:eqversion:05-01

Trust: 0.3

vendor:hitachimodel:ucosminexus developer light 06-70-/gscope: - version: -

Trust: 0.3

vendor:hitachimodel:ucosminexus developer light 06-71-/hscope: - version: -

Trust: 0.3

vendor:hitachimodel:ucosminexus developer light 06-70-/cscope: - version: -

Trust: 0.3

vendor:hitachimodel:device manager software (solarisscope:eqversion:6.1-02(x64))

Trust: 0.3

vendor:hitachimodel:cosminexus developer 05-05-/pscope: - version: -

Trust: 0.3

vendor:fujitsumodel:interstage application server enterprise editionscope:eqversion:8.0

Trust: 0.3

vendor:sunmodel:jdk 01ascope:eqversion:1.3.1

Trust: 0.3

vendor:debianmodel:linux mipselscope:eqversion:5.0

Trust: 0.3

vendor:susemodel:linux enterprise teradata sp3scope:eqversion:10

Trust: 0.3

vendor:hitachimodel:jp1/hicommand tuning managerscope:eqversion:05-40

Trust: 0.3

vendor:sunmodel:jndiscope:eqversion:1.2.1

Trust: 0.3

vendor:sunmodel:jdk 0 09scope:eqversion:1.5

Trust: 0.3

vendor:hitachimodel:device manager software (solaris(spscope:neversion:6.4.0-08

Trust: 0.3

vendor:hitachimodel:jp1/cm2/network node manager starter ed enterprise pa-riscscope:eqversion:08-00-03

Trust: 0.3

vendor:hitachimodel:jp1/hicommand tuning managerscope:eqversion:05-10

Trust: 0.3

vendor:hitachimodel:jp1/hicommand tiered storage managerscope:eqversion:05-00

Trust: 0.3

vendor:hitachimodel:ucosminexus developer standard 06-70-/bscope: - version: -

Trust: 0.3

vendor:hitachimodel:cosminexus developerscope:eqversion:05-05

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:6.0.19

Trust: 0.3

vendor:hitachimodel:cosminexus developer standard 06-00-/iscope: - version: -

Trust: 0.3

vendor:fujitsumodel:interstage job workload serverscope:eqversion:8.1

Trust: 0.3

vendor:hitachimodel:provisioning manager softwarescope:eqversion:6.0.0-00

Trust: 0.3

vendor:hitachimodel:cosminexus developer standard 06-51-/bscope: - version: -

Trust: 0.3

vendor:vmwaremodel:vcenterscope:eqversion:4.1

Trust: 0.3

vendor:ibmmodel:cognos business intelligence fp2scope:eqversion:88.4.1

Trust: 0.3

vendor:sunmodel:jre 04scope:eqversion:1.4.1

Trust: 0.3

vendor:hitachimodel:ucosminexus developer standard 06-70-/gscope: - version: -

Trust: 0.3

vendor:sunmodel:jdk 099scope:eqversion:1.1.8

Trust: 0.3

vendor:sunmodel:jdk updatescope:eqversion:1.6.021

Trust: 0.3

vendor:sunmodel:jre 006scope:eqversion:1.2.2

Trust: 0.3

vendor:redhatmodel:enterprise linux server optionalscope:eqversion:6

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:6.1.0.29

Trust: 0.3

vendor:hitachimodel:jp1/hicommand global link availability managerscope:eqversion:05-60

Trust: 0.3

vendor:hitachimodel:tuning manager software )scope:eqversion:6.1-00

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.0.2

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.2

Trust: 0.3

vendor:ibmmodel:tivoli enterprise consolescope:eqversion:3.9

Trust: 0.3

vendor:susemodel:linux enterprise java sp3scope:eqversion:10

Trust: 0.3

vendor:hitachimodel:cosminexus studioscope:eqversion:05-05

Trust: 0.3

vendor:ibmmodel:cognos now!scope:eqversion:4.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.4

Trust: 0.3

vendor:hitachimodel:processing kit for xml 01-05-/ascope: - version: -

Trust: 0.3

vendor:hitachimodel:cosminexus developer 05-05-/nscope: - version: -

Trust: 0.3

vendor:ibmmodel:db2 fixpackscope:eqversion:9.73

Trust: 0.3

vendor:hitachimodel:cosminexus application server 05-00-/nscope: - version: -

Trust: 0.3

vendor:hitachimodel:ucosminexus developer professional 06-71-/cscope: - version: -

Trust: 0.3

vendor:ibmmodel:tivoli netview for z/osscope:eqversion:5.3.0

Trust: 0.3

vendor:sunmodel:jdkscope:eqversion:1.1.6

Trust: 0.3

vendor:hitachimodel:ucosminexus service architectscope:eqversion:07-50-01

Trust: 0.3

vendor:ibmmodel:db2 fixpakscope:eqversion:9.52

Trust: 0.3

vendor:hpmodel:hp-ux web server suitescope:eqversion:2.31

Trust: 0.3

vendor:hitachimodel:cosminexus developer 05-01-/fscope: - version: -

Trust: 0.3

vendor:ibmmodel:tivoli storage productivity centerscope:neversion:4.2.1.185

Trust: 0.3

vendor:hitachimodel:ucosminexus service architectscope:eqversion:08-00

Trust: 0.3

vendor:sunmodel:jdk updatescope:eqversion:1.6.07

Trust: 0.3

vendor:attachmatemodel:reflection for secure it unix serverscope:eqversion:7.2

Trust: 0.3

vendor:sunmodel:jdk update25scope:eqversion:1.5.0

Trust: 0.3

vendor:hitachimodel:cosminexus developer standard 06-00-/hscope: - version: -

Trust: 0.3

vendor:vmwaremodel:virtualcenter updatescope:eqversion:2.51

Trust: 0.3

vendor:sunmodel:jdk 04scope:eqversion:1.3.1

Trust: 0.3

vendor:hitachimodel:replication manager softwarescope:eqversion:0

Trust: 0.3

vendor:ibmmodel:tivoli application dependency discovery managerscope:eqversion:7.2

Trust: 0.3

vendor:hitachimodel:replication manager software (linux(slesscope:eqversion:7.0.1-01

Trust: 0.3

vendor:hitachimodel:job management partner 1/automatic job management system webscope:eqversion:2-0

Trust: 0.3

vendor:sunmodel:jdk 1.6.0 01-b06scope: - version: -

Trust: 0.3

vendor:hitachimodel:cosminexus application server 05-00-/jscope: - version: -

Trust: 0.3

vendor:ibmmodel:rational clearquestscope:neversion:7.1.1.5

Trust: 0.3

vendor:ubuntumodel:linux lpiascope:eqversion:9.10

Trust: 0.3

vendor:hitachimodel:device manager software (solaris(spscope:eqversion:7.0.0-00

Trust: 0.3

vendor:hitachimodel:ucosminexus clientscope:eqversion:0

Trust: 0.3

vendor:hitachimodel:jp1/integrated management service supportscope:eqversion:-08-10-01

Trust: 0.3

vendor:hitachimodel:ucosminexus client 06-71-/gscope: - version: -

Trust: 0.3

vendor:hitachimodel:cosminexus developer light 06-51-/fscope: - version: -

Trust: 0.3

vendor:hitachimodel:ucosminexus developer professionalscope:eqversion:07-50-01

Trust: 0.3

vendor:sunmodel:jdk updatescope:eqversion:1.6.017

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:7.0

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:6.1.32

Trust: 0.3

vendor:hitachimodel:provisioning manager softwarescope:eqversion:0

Trust: 0.3

vendor:gentoomodel:linuxscope: - version: -

Trust: 0.3

vendor:sunmodel:jdk 1.5.0.0 03scope: - version: -

Trust: 0.3

vendor:hitachimodel:ucosminexus service architectscope:eqversion:07-50-10

Trust: 0.3

vendor:hitachimodel:cosminexus developer standard 06-50-/dscope: - version: -

Trust: 0.3

vendor:sunmodel:sdkscope:eqversion:1.4.227

Trust: 0.3

vendor:hitachimodel:cosminexus application server standard 06-50-/g (aixscope: - version: -

Trust: 0.3

vendor:vmwaremodel:vcenter updatescope:eqversion:4.11

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:6.0.1

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.5.13

Trust: 0.3

vendor:hitachimodel:cosminexus developer standard 06-51-/escope: - version: -

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.0.11

Trust: 0.3

vendor:hitachimodel:jp1/hicommand global link availability managerscope:eqversion:05-50

Trust: 0.3

vendor:sunmodel:sdkscope:eqversion:1.4.224

Trust: 0.3

vendor:ibmmodel:infosphere information serverscope:eqversion:8.1

Trust: 0.3

vendor:hitachimodel:cosminexus developer standard 06-02-/gscope: - version: -

Trust: 0.3

vendor:s u s emodel:novell linux posscope:eqversion:9

Trust: 0.3

vendor:debianmodel:linux s/390scope:eqversion:5.0

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:6.1.0.27

Trust: 0.3

vendor:ibmmodel:tivoli integrated portalscope:neversion:1.1.115

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.0.8

Trust: 0.3

vendor:hitachimodel:ucosminexus developer standardscope:eqversion:06-71

Trust: 0.3

vendor:hitachimodel:cosminexus studio web editionscope:eqversion:-04-01

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.5.15

Trust: 0.3

vendor:sunmodel:jdk 10scope:eqversion:1.1.8

Trust: 0.3

vendor:hitachimodel:ucosminexus developer light 06-71-/cscope: - version: -

Trust: 0.3

vendor:sunmodel:jdk update18scope:eqversion:1.5.0

Trust: 0.3

vendor:hitachimodel:tiered storage manager softwarescope:eqversion:7.0.1-02

Trust: 0.3

vendor:hitachimodel:ucosminexus application server standard 06-72-/cscope: - version: -

Trust: 0.3

vendor:hitachimodel:device manager software (solarisscope:eqversion:6.1.1-00(x64))

Trust: 0.3

vendor:fujitsumodel:interstage application server enterprise edition 9.1.0bscope: - version: -

Trust: 0.3

vendor:hitachimodel:ucosminexus application server enterprise )scope:eqversion:07-10-1

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.5.28

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:6.1.20

Trust: 0.3

vendor:novellmodel:identity manager roles based provisioning modulescope:eqversion:3.7

Trust: 0.3

vendor:hitachimodel:cosminexus developer professionalscope:eqversion:6.0

Trust: 0.3

vendor:ibmmodel:tivoli federated identity managerscope:eqversion:6.2.1.2

Trust: 0.3

vendor:hitachimodel:ucosminexus application server standardscope:eqversion:07-50-10

Trust: 0.3

vendor:ibmmodel:tivoli monitoringscope:eqversion:6.1

Trust: 0.3

vendor:fujitsumodel:interstage application server enterprise edition bscope:eqversion:9.0.1

Trust: 0.3

vendor:ibmmodel:tivoli composite application manager for webspherescope:eqversion:6

Trust: 0.3

vendor:ibmmodel:tivoli federated identity managerscope: - version: -

Trust: 0.3

vendor:hitachimodel:ucosminexus developer professional 06-71-/gscope: - version: -

Trust: 0.3

vendor:sunmodel:jrescope:eqversion:1.3.0

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.5.20

Trust: 0.3

vendor:ibmmodel:cognos controllerscope:eqversion:8.0

Trust: 0.3

vendor:hitachimodel:job management partner 1/automatic job management system webscope:eqversion:3-0

Trust: 0.3

vendor:hitachimodel:ucosminexus developer standard 06-70-/ascope: - version: -

Trust: 0.3

vendor:novellmodel:identity managerscope:eqversion:3.6.1

Trust: 0.3

vendor:hitachimodel:jp1/hicommand tiered storage managerscope:eqversion:05-50-01

Trust: 0.3

vendor:hitachimodel:cosminexus developerscope:eqversion:5.0

Trust: 0.3

vendor:hitachimodel:it operations directorscope:neversion:02-50-07

Trust: 0.3

vendor:sunmodel:jdkscope:eqversion:1.3.112

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.0

Trust: 0.3

vendor:vmwaremodel:vcenter updatescope:eqversion:4.01

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.6

Trust: 0.3

vendor:hitachimodel:tuning manager softwarescope:eqversion:6.401

Trust: 0.3

vendor:hitachimodel:cosminexus developer standard 06-00-/cscope: - version: -

Trust: 0.3

vendor:hitachimodel:cosminexus developer standard 06-02-/escope: - version: -

Trust: 0.3

vendor:susemodel:linux enterprise sdk sp1scope:eqversion:11

Trust: 0.3

vendor:hitachimodel:ucosminexus developer professional 06-70-/cscope: - version: -

Trust: 0.3

vendor:ibmmodel:tivoli netview for z/osscope:eqversion:5.2.0

Trust: 0.3

vendor:sunmodel:jdkscope:eqversion:1.3.122

Trust: 0.3

vendor:ibmmodel:tivoli application dependency discovery managerscope:eqversion:7.1.2

Trust: 0.3

vendor:hpmodel:hp-ux web server suitescope:eqversion:3.10

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.7

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.4

Trust: 0.3

vendor:hitachimodel:device manager software (solarisscope:eqversion:6.0-06(x64))

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.5.32

Trust: 0.3

vendor:hitachimodel:ucosminexus developer standard 06-71-/bscope: - version: -

Trust: 0.3

vendor:hitachimodel:ucosminexus service architectscope:eqversion:07-50-02

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.5.6

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:6.0.24

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:10.04

Trust: 0.3

vendor:sunmodel:jndi/ldapscope:eqversion:1.2.2

Trust: 0.3

vendor:ibmmodel:rational clearquestscope:eqversion:7.0.2

Trust: 0.3

vendor:ibmmodel:db2 fix pack 6ascope:eqversion:9.5

Trust: 0.3

vendor:oraclemodel:jrockit r27.6.2scope: - version: -

Trust: 0.3

vendor:hitachimodel:ucosminexus clientscope:eqversion:07-60

Trust: 0.3

vendor:ibmmodel:tivoli common reportingscope:eqversion:1.2

Trust: 0.3

vendor:hitachimodel:cosminexus developer professional 06-02-/dscope: - version: -

Trust: 0.3

vendor:hitachimodel:cosminexus studio web editionscope:eqversion:4

Trust: 0.3

vendor:ibmmodel:db2scope:eqversion:9.5

Trust: 0.3

vendor:hpmodel:tru64 unix 5.1b-5scope: - version: -

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.0.7

Trust: 0.3

vendor:ibmmodel:cognos powerplayscope:eqversion:10.0

Trust: 0.3

vendor:hitachimodel:jp1/hicommand provisioning manager )scope:eqversion:05-90

Trust: 0.3

vendor:sunmodel:jdkscope:eqversion:1.4

Trust: 0.3

vendor:hitachimodel:cosminexus developer standard 06-51-/gscope: - version: -

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:6.1.25

Trust: 0.3

vendor:hitachimodel:ucosminexus application server enterprisescope:eqversion:06-72(*1)

Trust: 0.3

vendor:hitachimodel:ucosminexus application server enterprise 06-70-/lscope: - version: -

Trust: 0.3

vendor:sunmodel:jre 003scope:eqversion:1.2.1

Trust: 0.3

vendor:hitachimodel:cosminexus application server enterprise 06-51-/gscope: - version: -

Trust: 0.3

vendor:hitachimodel:cosminexus application server 05-01-/bscope: - version: -

Trust: 0.3

vendor:hitachimodel:ucosminexus developer professionalscope:eqversion:07-50-02

Trust: 0.3

vendor:hitachimodel:ucosminexus developer professionalscope:eqversion:07-20

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:6.0.10

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:6.0.9

Trust: 0.3

vendor:ibmmodel:cognos executive viewerscope:eqversion:9.0

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:6.1.13

Trust: 0.3

vendor:ibmmodel:cognos real-time monitoringscope:eqversion:10.0

Trust: 0.3

vendor:hitachimodel:cosminexus server web edition 04-01-/ascope:eqversion: -

Trust: 0.3

vendor:attachmatemodel:reflection for secure it windows server sp2scope:eqversion:7.0

Trust: 0.3

vendor:hitachimodel:ucosminexus developer light 06-71-/bscope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/integrated management service supportscope:eqversion:-08-11-01

Trust: 0.3

vendor:fujitsumodel:interstage service integrator enterprise editionscope:eqversion:9.0

Trust: 0.3

vendor:ibmmodel:tivoli access manager for e-businessscope:eqversion:6.1.1

Trust: 0.3

vendor:sunmodel:jre 27scope:eqversion:1.4.2

Trust: 0.3

vendor:hitachimodel:cosminexus developer light 06-00-/fscope: - version: -

Trust: 0.3

vendor:ibmmodel:tivoli monitoringscope:eqversion:6.2.1

Trust: 0.3

vendor:hitachimodel:ucosminexus operatorscope:eqversion:07-20

Trust: 0.3

vendor:hitachimodel:jp1/hicommand global link availability managerscope:eqversion:05-08

Trust: 0.3

vendor:ibmmodel:tivoli directory serverscope:eqversion:6.1

Trust: 0.3

vendor:sunmodel:jdk updatescope:eqversion:1.6.014

Trust: 0.3

vendor:hpmodel:openvms secure web serverscope:eqversion:2.1-1

Trust: 0.3

vendor:hitachimodel:cosminexus developer professional 06-02-/gscope: - version: -

Trust: 0.3

vendor:hitachimodel:cosminexus developer lightscope:eqversion:6

Trust: 0.3

vendor:s u s emodel:open-enterprise-serverscope:eqversion:0

Trust: 0.3

vendor:hitachimodel:tiered storage manager software (solaris(spscope:neversion:7.1.0-00

Trust: 0.3

vendor:hitachimodel:cosminexus application server enterprise 06-50-/gscope: - version: -

Trust: 0.3

vendor:sunmodel:jdk updatescope:eqversion:1.6.011

Trust: 0.3

vendor:hitachimodel:global link manager softwarescope:neversion:6.6-00

Trust: 0.3

vendor:oraclemodel:jrockit r27.6.3scope: - version: -

Trust: 0.3

vendor:hitachimodel:cosminexus developer light 06-51-/bscope: - version: -

Trust: 0.3

vendor:sunmodel:jdk update14scope:eqversion:1.5.0

Trust: 0.3

vendor:hitachimodel:cosminexus application server 05-02-/cscope: - version: -

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.5

Trust: 0.3

vendor:ibmmodel:tivoli directory server 6.2.0.3-tiv-itds-if0scope:neversion: -

Trust: 0.3

vendor:attachmatemodel:reflection for secure it unix client sp1scope:neversion:7.2

Trust: 0.3

vendor:sunmodel:jdkscope:eqversion:1.3.121

Trust: 0.3

vendor:hitachimodel:processing kit for xml 02-05-/dscope: - version: -

Trust: 0.3

vendor:hitachimodel:processing kit for xml 02-00-/bscope: - version: -

Trust: 0.3

vendor:redhatmodel:enterprise linux desktopscope:eqversion:6

Trust: 0.3

vendor:hitachimodel:cosminexus developer professional 06-51-/dscope: - version: -

Trust: 0.3

vendor:hitachimodel:ucosminexus application server standard 06-70-/oscope: - version: -

Trust: 0.3

vendor:hitachimodel:ucosminexus application server standard 06-72-/ascope: - version: -

Trust: 0.3

vendor:hitachimodel:ucosminexus developer professionalscope:eqversion:07-50

Trust: 0.3

vendor:hitachimodel:device manager software )scope:eqversion:6.1.1-03

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:6.0.28

Trust: 0.3

vendor:hitachimodel:ucosminexus clientscope:eqversion:07-20-01

Trust: 0.3

vendor:hitachimodel:ucosminexus service architectscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:rational clearcasescope:eqversion:7.0

Trust: 0.3

vendor:hitachimodel:replication manager softwarescope:eqversion:6.1-00

Trust: 0.3

vendor:hitachimodel:device manager software (solarisscope:eqversion:6.1.1-03(x64))

Trust: 0.3

vendor:hitachimodel:ucosminexus developer standardscope:eqversion:07-00-02

Trust: 0.3

vendor:hitachimodel:jp1/hicommand global link availability managerscope:eqversion:05-06

Trust: 0.3

vendor:hitachimodel:cosminexus developer standard 06-51-/jscope: - version: -

Trust: 0.3

vendor:hitachimodel:it operations analyzerscope:eqversion:02-53

Trust: 0.3

vendor:hitachimodel:jp1/hicommand tuning managerscope:eqversion:05-90

Trust: 0.3

vendor:ibmmodel:cognos banking risk performancescope:eqversion:8.0

Trust: 0.3

vendor:hitachimodel:ucosminexus operatorscope:eqversion:07-50

Trust: 0.3

vendor:hitachimodel:ucosminexus service architectscope:eqversion:07-10-01

Trust: 0.3

vendor:hitachimodel:ucosminexus application server enterprisescope:eqversion:07-00-12

Trust: 0.3

vendor:attachmatemodel:reflection for secure it unix client sp1scope:eqversion:7.0

Trust: 0.3

vendor:hitachimodel:ucosminexus developer standard 06-71-/cscope: - version: -

Trust: 0.3

vendor:ibmmodel:cics transaction gatewayscope:eqversion:6.1

Trust: 0.3

vendor:hpmodel:openvms secure web serverscope:eqversion:7.3

Trust: 0.3

vendor:sunmodel:jre 004scope:eqversion:1.2.2

Trust: 0.3

vendor:hitachimodel:cosminexus developer standard 06-51-/kscope: - version: -

Trust: 0.3

vendor:vmwaremodel:virtualcenter update 6ascope:eqversion:2.5

Trust: 0.3

vendor:ibmmodel:websphere datapower xc10 appliancescope:eqversion:1.0.0.0

Trust: 0.3

vendor:hitachimodel:cosminexus application server enterprise )scope:eqversion:06-02

Trust: 0.3

vendor:hitachimodel:cosminexus developer 05-00-/iscope: - version: -

Trust: 0.3

vendor:hitachimodel:cosminexus developer professional 06-00-/dscope: - version: -

Trust: 0.3

vendor:hitachimodel:ucosminexus application server enterprisescope:eqversion:07-50-10

Trust: 0.3

vendor:ibmmodel:tivoli storage productivity center for replicationscope:neversion:4.2.1.4

Trust: 0.3

vendor:hitachimodel:ucosminexus clientscope:eqversion:06-70

Trust: 0.3

vendor:hitachimodel:tiered storage manager software (linux(rhelscope:eqversion:7.0.1-02

Trust: 0.3

vendor:hitachimodel:device manager software (linux(rhelscope:neversion:7.1.0-00

Trust: 0.3

vendor:ibmmodel:cics transaction gatewayscope:eqversion:8.0

Trust: 0.3

vendor:attachmatemodel:reflection for the web r3 buildscope:eqversion:2008527

Trust: 0.3

vendor:hitachimodel:ucosminexus developer professionalscope:eqversion:07-10-01

Trust: 0.3

vendor:hitachimodel:processing kit for xml 02-05-/cscope: - version: -

Trust: 0.3

vendor:sunmodel:jre 17scope:eqversion:1.3.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.3

Trust: 0.3

vendor:hitachimodel:cosminexus developer professionalscope:eqversion:6

Trust: 0.3

vendor:ibmmodel:tivoli federated identity managerscope:neversion:6.2.14

Trust: 0.3

vendor:sunmodel:jre 1.5.0 09scope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/hicommand tuning managerscope:eqversion:03-50

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.0.10

Trust: 0.3

vendor:redhatmodel:enterprise linux ws extrasscope:eqversion:4

Trust: 0.3

vendor:hitachimodel:jp1/cm2/snmp system observer )scope:eqversion:09-00

Trust: 0.3

vendor:hpmodel:business availability centerscope:eqversion:7.55

Trust: 0.3

vendor:hitachimodel:jp1/hicommand tiered storage managerscope:eqversion:0

Trust: 0.3

vendor:susemodel:linux enterprise serverscope:eqversion:9

Trust: 0.3

vendor:vmwaremodel:esx serverscope:eqversion:3.0.3

Trust: 0.3

vendor:hpmodel:hp-ux b.11.11scope: - version: -

Trust: 0.3

vendor:hitachimodel:ucosminexus developer standardscope:eqversion:07-20

Trust: 0.3

vendor:redhatmodel:enterprise linux es extrasscope:eqversion:4

Trust: 0.3

vendor:ibmmodel:tivoli netcool performance manager for wirelessscope:eqversion:9.1.2

Trust: 0.3

vendor:sunmodel:jdk updatescope:eqversion:1.6.010

Trust: 0.3

vendor:hitachimodel:jp1/hicommand replication monitorscope:eqversion:05-90

Trust: 0.3

vendor:hitachimodel:ucosminexus developer professionalscope:eqversion:07-00-05

Trust: 0.3

vendor:hitachimodel:jp1/cm2/network node manager i advancedscope:eqversion:0

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.5.7

Trust: 0.3

vendor:hpmodel:systems insight manager updatescope:eqversion:5.31

Trust: 0.3

vendor:hitachimodel:cosminexus application server 05-00-/fscope: - version: -

Trust: 0.3

vendor:hitachimodel:ucosminexus developer standard 06-71-/ascope: - version: -

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.5.26

Trust: 0.3

vendor:hitachimodel:ucosminexus clientscope:eqversion:07-10

Trust: 0.3

vendor:hitachimodel:ucosminexus application server standard 06-70-/b )scope: - version: -

Trust: 0.3

vendor:hitachimodel:cosminexus developer 05-05-/mscope: - version: -

Trust: 0.3

vendor:hitachimodel:global link manager softwarescope:eqversion:6.2-01

Trust: 0.3

vendor:sunmodel:sdkscope:eqversion:1.4.223

Trust: 0.3

vendor:sunmodel:jdkscope:eqversion:1.3.123

Trust: 0.3

vendor:hitachimodel:ucosminexus service architectscope:eqversion:07-50-09

Trust: 0.3

vendor:fujitsumodel:interstage application server enterprise editionscope:eqversion:5.0.1

Trust: 0.3

vendor:hitachimodel:ucosminexus application server enterprise 06-72-/dscope: - version: -

Trust: 0.3

vendor:hitachimodel:ucosminexus service platformscope:eqversion:07-00-05

Trust: 0.3

vendor:hitachimodel:cosminexus application server standard 06-50-/iscope: - version: -

Trust: 0.3

vendor:sunmodel:jre 003scope:eqversion:1.1.8

Trust: 0.3

vendor:hitachimodel:ucosminexus operatorscope:eqversion:07-20-01

Trust: 0.3

vendor:ibmmodel:db2 fixpackscope:eqversion:9.72

Trust: 0.3

vendor:hitachimodel:provisioning manager software (linux(slesscope:neversion:6.4.0-08

Trust: 0.3

vendor:vmwaremodel:vcenter update manager updatescope:neversion:4.12

Trust: 0.3

vendor:sunmodel:jdk 05scope:eqversion:1.3

Trust: 0.3

vendor:mandrakesoftmodel:enterprise serverscope:eqversion:5

Trust: 0.3

vendor:hitachimodel:ucosminexus application server standard 06-71-/fscope: - version: -

Trust: 0.3

vendor:hitachimodel:processing kit for xml 01-05-/dscope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/hicommand global link availability managerscope:eqversion:05-09

Trust: 0.3

vendor:hitachimodel:ucosminexus application server standardscope:eqversion:07-03-03

Trust: 0.3

vendor:hitachimodel:cosminexus developer standard 06-00-/fscope: - version: -

Trust: 0.3

vendor:hitachimodel:cosminexus developer professional 06-51-/cscope: - version: -

Trust: 0.3

vendor:sunmodel:jdkscope:eqversion:1.3.116

Trust: 0.3

vendor:hitachimodel:jp1/cm2/network node manager starter ed enterprise solarisscope:eqversion:08-00-03

Trust: 0.3

vendor:hitachimodel:ucosminexus service platformscope:eqversion:07-20-01

Trust: 0.3

vendor:hitachimodel:ucosminexus application server enterprise hp-uxscope:eqversion:07-10-01

Trust: 0.3

vendor:hitachimodel:cosminexus client 06-02-/gscope: - version: -

Trust: 0.3

vendor:sunmodel:jdk update16scope:eqversion:1.5.0

Trust: 0.3

vendor:hitachimodel:jp1/cm2/network node manager starter edition )scope:eqversion:25008-00

Trust: 0.3

vendor:hitachimodel:ucosminexus developer professionalscope:eqversion:07-50-09

Trust: 0.3

vendor:hitachimodel:tiered storage manager software (linux(slesscope:eqversion:7.0.0-00

Trust: 0.3

vendor:hitachimodel:ucosminexus application server standardscope:eqversion:07-50-09

Trust: 0.3

vendor:hitachimodel:tiered storage manager software (linux(slesscope:neversion:6.4.0-08

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.5.3

Trust: 0.3

vendor:sunmodel:sdk .0 01scope:eqversion:1.4

Trust: 0.3

vendor:hitachimodel:cosminexus developer professional 06-50-/dscope: - version: -

Trust: 0.3

vendor:hitachimodel:cosminexus developerscope:eqversion:05-00

Trust: 0.3

vendor:hitachimodel:device manager software (linux(slesscope:eqversion:7.0.1-02

Trust: 0.3

vendor:ibmmodel:rational clearcasescope:eqversion:7.0.0.4

Trust: 0.3

vendor:hitachimodel:tuning manager software )scope:eqversion:6.2-01

Trust: 0.3

vendor:hitachimodel:cosminexus developer light 06-00-/hscope: - version: -

Trust: 0.3

vendor:ibmmodel:tivoli netcool performance managerscope:eqversion:1.3.1

Trust: 0.3

vendor:sunmodel:jdk updatescope:eqversion:1.6.020

Trust: 0.3

vendor:redhatmodel:enterprise linux as for sapscope:eqversion:4

Trust: 0.3

vendor:hitachimodel:cosminexus studioscope:eqversion:5

Trust: 0.3

vendor:ibmmodel:db2 fixpakscope:eqversion:9.54

Trust: 0.3

vendor:hitachimodel:cosminexus developer standard 06-02-/fscope: - version: -

Trust: 0.3

vendor:hitachimodel:device manager software (solarisscope:eqversion:6.1-03(x64))

Trust: 0.3

vendor:hitachimodel:cosminexus developer standard 06-51-/dscope: - version: -

Trust: 0.3

vendor:hitachimodel:cosminexus clientscope:eqversion:06-51

Trust: 0.3

vendor:ibmmodel:tivoli composite application manager for webspherescope:eqversion:6.2

Trust: 0.3

vendor:ibmmodel:system storage ds8700scope:eqversion:0

Trust: 0.3

vendor:hitachimodel:ucosminexus application server enterprisescope:eqversion:07-00-10

Trust: 0.3

vendor:hitachimodel:cosminexus clientscope:eqversion:06-00

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:6.1.33

Trust: 0.3

vendor:hitachimodel:ucosminexus service architectscope:eqversion:07-20-02

Trust: 0.3

vendor:hitachimodel:cosminexus studio web editionscope:eqversion:-04-00

Trust: 0.3

vendor:fujitsumodel:interstage service integrator enterprise edition 9.0.0ascope: - version: -

Trust: 0.3

vendor:hitachimodel:cosminexus application server standard 06-51-/iscope: - version: -

Trust: 0.3

vendor:ibmmodel:tivoli directory server 6.3.0.0-tiv-itds-if0scope:neversion: -

Trust: 0.3

vendor:sunmodel:jdk updatescope:eqversion:1.6.05

Trust: 0.3

vendor:hitachimodel:jp1/hicommand global link availability managerscope:eqversion:0

Trust: 0.3

vendor:hitachimodel:cosminexus studioscope:eqversion:05-00

Trust: 0.3

vendor:sunmodel:jre .0 03scope:eqversion:1.3

Trust: 0.3

vendor:hitachimodel:tuning manager softwarescope:eqversion:6.0

Trust: 0.3

vendor:hitachimodel:cosminexus developer standard 06-00-/dscope: - version: -

Trust: 0.3

vendor:ibmmodel:cognos business viewpointscope:eqversion:10.0

Trust: 0.3

vendor:sunmodel:jdkscope:eqversion:1.3.113

Trust: 0.3

vendor:ibmmodel:websphere datapower xc10 appliancescope:neversion:1.0.0.5

Trust: 0.3

vendor:hitachimodel:cosminexus application server enterprise 06-51-/b (linux(scope: - version: -

Trust: 0.3

vendor:hitachimodel:ucosminexus service platformscope:eqversion:07-03-03

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:6.0.14

Trust: 0.3

vendor:ibmmodel:tivoli integrated portalscope:eqversion:1.1.114

Trust: 0.3

vendor:hpmodel:systems insight manager sp2scope:eqversion:5.0

Trust: 0.3

vendor:sunmodel:jdk 19scope:eqversion:1.3.1

Trust: 0.3

vendor:hitachimodel:cosminexus developer professional 06-50-/fscope: - version: -

Trust: 0.3

vendor:hitachimodel:cosminexus application server 05-01-/iscope: - version: -

Trust: 0.3

vendor:fujitsumodel:interstage software quality analyzer 10.0.0ascope: - version: -

Trust: 0.3

vendor:hitachimodel:cosminexus application server standard )scope:eqversion:06-02

Trust: 0.3

vendor:hitachimodel:ucosminexus developer professionalscope:eqversion:07-20-02

Trust: 0.3

vendor:ibmmodel:cognos tm1scope:eqversion:9.0

Trust: 0.3

vendor:hitachimodel:ucosminexus clientscope:eqversion:07-00-05

Trust: 0.3

vendor:hitachimodel:cosminexus application server 05-00-/dscope: - version: -

Trust: 0.3

vendor:hitachimodel:it operations analyzerscope:neversion:02-53-01

Trust: 0.3

vendor:hitachimodel:cosminexus developer professional 06-50-/escope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/integrated management service supportscope:eqversion:-0

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.0.15

Trust: 0.3

vendor:sunmodel:jdk 003scope:eqversion:1.1.8

Trust: 0.3

vendor:hitachimodel:cosminexus application server 05-01-/fscope: - version: -

Trust: 0.3

vendor:ibmmodel:cognos decisionstreamscope:eqversion:7.0

Trust: 0.3

vendor:hitachimodel:ucosminexus application server enterprisescope:eqversion:07-10-01

Trust: 0.3

vendor:hitachimodel:jp1/hicommand replication monitorscope:eqversion:05-60

Trust: 0.3

vendor:hitachimodel:jp1/hicommand tuning managerscope:eqversion:05-00

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:6.1.0.34

Trust: 0.3

vendor:hitachimodel:jp1/automatic job management system web operation assistantscope:eqversion:2-0

Trust: 0.3

vendor:hitachimodel:cosminexus application server 05-01-/lscope: - version: -

Trust: 0.3

vendor:ibmmodel:infosphere information serverscope:eqversion:8.5

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.5.25

Trust: 0.3

vendor:sunmodel:jre 19scope:eqversion:1.3.1

Trust: 0.3

vendor:ibmmodel:rational clearcasescope:eqversion:7.1.0.1

Trust: 0.3

vendor:hitachimodel:ucosminexus application server standard 06-70-/jscope: - version: -

Trust: 0.3

vendor:attachmatemodel:reflection for secure it windows serverscope:eqversion:6.0

Trust: 0.3

vendor:hitachimodel:cosminexus application serverscope:eqversion:05-02

Trust: 0.3

vendor:hitachimodel:tuning manager softwarescope:eqversion:7.001

Trust: 0.3

vendor:ibmmodel:rational clearquestscope:eqversion:7.0.13

Trust: 0.3

vendor:ibmmodel:cics transaction gatewayscope:eqversion:7.1

Trust: 0.3

vendor:hitachimodel:cosminexus application server 05-00-/oscope: - version: -

Trust: 0.3

vendor:hitachimodel:cosminexus application server 05-00-/hscope: - version: -

Trust: 0.3

vendor:hitachimodel:tuning manager software )scope:eqversion:6.402

Trust: 0.3

vendor:hitachimodel:tuning manager software )scope:eqversion:6.0

Trust: 0.3

vendor:hpmodel:systems insight manager sp6scope:eqversion:5.0

Trust: 0.3

vendor:hitachimodel:ucosminexus developer standardscope:eqversion:07-20-01

Trust: 0.3

vendor:sunmodel:jdk updatescope:eqversion:1.6.016

Trust: 0.3

vendor:ibmmodel:cognos business intelligencescope:eqversion:8.0

Trust: 0.3

vendor:hpmodel:network node manager iscope:eqversion:9.00

Trust: 0.3

vendor:hitachimodel:ucosminexus service architectscope:eqversion:07-03-03

Trust: 0.3

vendor:hitachimodel:ucosminexus developer light 06-71-/dscope: - version: -

Trust: 0.3

vendor:hitachimodel:cosminexus application server enterprise 06-51-/jscope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/cm2/network node manager starter edition pa-riscscope:eqversion:25008-00-03

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:6.1.1

Trust: 0.3

vendor:sunmodel:jdk 1.5.0 07-b03scope: - version: -

Trust: 0.3

vendor:hitachimodel:cosminexus application server standard 06-51-/b (linux(scope: - version: -

Trust: 0.3

vendor:hitachimodel:cosminexus application server standard 06-50-/b )scope: - version: -

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.1

Trust: 0.3

vendor:fujitsumodel:interstage application server standard-j editionscope:eqversion:8.0.2

Trust: 0.3

vendor:sunmodel:jre 16scope:eqversion:1.3.1

Trust: 0.3

vendor:hitachimodel:jp1/cm2/network node manager starter ed enterprise (hp-ux(pa-riscscope:eqversion:08-00

Trust: 0.3

vendor:hitachimodel:cosminexus application server 05-05-/nscope: - version: -

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.8

Trust: 0.3

vendor:hitachimodel:jp1/hicommand global link availability managerscope:eqversion:05-07

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:7.0.6

Trust: 0.3

vendor:hitachimodel:ucosminexus service platformscope:eqversion:0

Trust: 0.3

vendor:redhatmodel:jboss enterprise portal platform 4.3.cp06scope: - version: -

Trust: 0.3

vendor:hitachimodel:ucosminexus developer standardscope:eqversion:06-70

Trust: 0.3

vendor:redhatmodel:enterprise linux sapscope:eqversion:6

Trust: 0.3

vendor:ibmmodel:tivoli common reportingscope:eqversion:1.3

Trust: 0.3

vendor:hitachimodel:jp1/hicommand provisioning managerscope:eqversion:0

Trust: 0.3

vendor:hitachimodel:cosminexus developer standard 06-02-/ascope: - version: -

Trust: 0.3

vendor:hitachimodel:cosminexus application server 05-05-/pscope: - version: -

Trust: 0.3

vendor:hitachimodel:jp1/hicommand replication monitorscope:eqversion:05-50

Trust: 0.3

vendor:sunmodel:jre 03scope:eqversion:1.3

Trust: 0.3

vendor:ibmmodel:tivoli netviewscope:eqversion:7.1.5

Trust: 0.3

vendor:hitachimodel:cosminexus developer professional 06-51-/bscope: - version: -

Trust: 0.3

vendor:ibmmodel:tivoli common reportingscope:eqversion:2.1

Trust: 0.3

vendor:hpmodel:openvms secure web serverscope:eqversion:7.2-2

Trust: 0.3

vendor:hpmodel:systems insight managerscope:eqversion:6.0

Trust: 0.3

vendor:hitachimodel:cosminexus application server enterprise 06-51-/fscope: - version: -

Trust: 0.3

vendor:hitachimodel:cosminexus application server 05-00-/kscope: - version: -

Trust: 0.3

vendor:hitachimodel:replication manager softwarescope:eqversion:6.1-01

Trust: 0.3

vendor:hitachimodel:cosminexus developer 05-05-/kscope: - version: -

Trust: 0.3

vendor:hitachimodel:cosminexus server web editionscope:eqversion:-04-00

Trust: 0.3

vendor:hitachimodel:jp1/hicommand global link availability managerscope:eqversion:05-04

Trust: 0.3

vendor:hitachimodel:cosminexus developer light 06-50-/dscope: - version: -

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.1

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.5.29

Trust: 0.3

vendor:sunmodel:jdkscope:eqversion:1.2.1

Trust: 0.3

vendor:sunmodel:jdk update22scope:eqversion:1.5.0

Trust: 0.3

vendor:ibmmodel:rational clearcasescope:eqversion:7.1.1.4

Trust: 0.3

vendor:hitachimodel:ucosminexus application server enterprisescope:eqversion:07-50-09

Trust: 0.3

vendor:sunmodel:jdkscope:eqversion:1.3.109

Trust: 0.3

vendor:sunmodel:jdk update15scope:eqversion:1.5.0

Trust: 0.3

vendor:hpmodel:systems insight managerscope:eqversion:6.3

Trust: 0.3

vendor:debianmodel:linux amd64scope:eqversion:5.0

Trust: 0.3

vendor:hitachimodel:cosminexus developer 05-01-/cscope: - version: -

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:6.0.11

Trust: 0.3

vendor:redhatmodel:jboss enterprise web platform for rhel 4esscope:eqversion:5

Trust: 0.3

vendor:hitachimodel:cosminexus developer 05-01-/escope: - version: -

Trust: 0.3

vendor:sunmodel:jdkscope:eqversion:1.3.110

Trust: 0.3

vendor:redhatmodel:enterprise linux desktop workstation clientscope:eqversion:5

Trust: 0.3

vendor:hitachimodel:provisioning manager software (solaris(spscope:neversion:6.4.0-08

Trust: 0.3

vendor:sunmodel:jdk 1.4.2 10scope: - version: -

Trust: 0.3

vendor:hitachimodel:cosminexus developer standard 06-02-/cscope: - version: -

Trust: 0.3

vendor:vmwaremodel:esx updatescope:eqversion:4.11

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.0.28

Trust: 0.3

vendor:hitachimodel:device manager software (solarisscope:eqversion:6.2-00(x64))

Trust: 0.3

vendor:apachemodel:tomcatscope:eqversion:5.5.10

Trust: 0.3

vendor:ibmmodel:db2 fixpackscope:eqversion:9.57

Trust: 0.3

vendor:hitachimodel:it operations analyzerscope:eqversion:02-01

Trust: 0.3

vendor:ubuntumodel:linux armscope:eqversion:9.10

Trust: 0.3

vendor:hitachimodel:ucosminexus clientscope:eqversion:07-50-01

Trust: 0.3

sources: BID: 46091 // CNNVD: CNNVD-201102-241 // JVNDB: JVNDB-2011-000017 // JVNDB: JVNDB-2011-001185 // JVNDB: JVNDB-2011-000020 // NVD: CVE-2010-4476

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2010-4476
value: MEDIUM

Trust: 1.0

IPA: JVNDB-2011-000017
value: MEDIUM

Trust: 0.8

NVD: CVE-2010-4476
value: MEDIUM

Trust: 0.8

IPA: JVNDB-2011-000020
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201102-241
value: MEDIUM

Trust: 0.6

VULMON: CVE-2010-4476
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2010-4476
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

IPA: JVNDB-2011-000017
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

IPA: JVNDB-2011-000020
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

sources: VULMON: CVE-2010-4476 // CNNVD: CNNVD-201102-241 // JVNDB: JVNDB-2011-000017 // JVNDB: JVNDB-2011-001185 // JVNDB: JVNDB-2011-000020 // NVD: CVE-2010-4476

PROBLEMTYPE DATA

problemtype:CWE-189

Trust: 1.6

problemtype:NVD-CWE-Other

Trust: 1.0

problemtype:CWE-DesignError

Trust: 0.8

sources: JVNDB: JVNDB-2011-000017 // JVNDB: JVNDB-2011-001185 // JVNDB: JVNDB-2011-000020 // NVD: CVE-2010-4476

THREAT TYPE

remote

Trust: 0.8

sources: PACKETSTORM: 99798 // PACKETSTORM: 112826 // CNNVD: CNNVD-201102-241

TYPE

lack of information

Trust: 0.6

sources: CNNVD: CNNVD-201102-241

CONFIGURATIONS

sources: JVNDB: JVNDB-2011-000017

EXPLOIT AVAILABILITY

sources: VULMON: CVE-2010-4476

PATCH

title:HPSBMU02769 SSRT100846url:http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03298151

Trust: 2.4

title:NV18-002url:http://jpn.nec.com/security-info/secinfo/nv18-002.html

Trust: 2.4

title:1462019url:http://www-01.ibm.com/support/docview.wss?uid=swg21462019

Trust: 1.6

title:PM31983url:http://www-01.ibm.com/support/docview.wss?uid=swg1PM31983

Trust: 0.8

title:IZ94423url:http://www-01.ibm.com/support/docview.wss?uid=swg1IZ94423

Trust: 0.8

title:security-5.html#Not_a_vulnerability_in_Tomcaturl:http://tomcat.apache.org/security-5.html#Not_a_vulnerability_in_Tomcat

Trust: 0.8

title:security-6.html#Not_a_vulnerability_in_Tomcaturl:http://tomcat.apache.org/security-6.html#Not_a_vulnerability_in_Tomcat

Trust: 0.8

title:security-7.html#Not_a_vulnerability_in_Tomcaturl:http://tomcat.apache.org/security-7.html#Not_a_vulnerability_in_Tomcat

Trust: 0.8

title:1066244url:http://svn.apache.org/viewvc?view=revision&revision=1066244

Trust: 0.8

title:1066315url:http://svn.apache.org/viewvc?view=revision&revision=1066315

Trust: 0.8

title:1066318url:http://svn.apache.org/viewvc?view=revision&revision=1066318

Trust: 0.8

title:HT4562url:http://support.apple.com/kb/HT4562

Trust: 0.8

title:HT4563url:http://support.apple.com/kb/HT4563

Trust: 0.8

title:HT4562url:http://support.apple.com/kb/HT4562?viewlocale=ja_JP

Trust: 0.8

title:HT4563url:http://support.apple.com/kb/HT4563?viewlocale=ja_JP

Trust: 0.8

title:tomcat5-5.5.23-0jpp.17.0.1.AXS3url:https://tsn.miraclelinux.com/tsn_local/index.php?m=errata&a=detail&eid=1382

Trust: 0.8

title:HPUXWSATW233url:https://h20392.www2.hp.com/portal/swdepot/displayProductInfo.do?productNumber=HPUXWSATW233

Trust: 0.8

title:HPUXWSATW315url:https://h20392.www2.hp.com/portal/swdepot/displayProductInfo.do?productNumber=HPUXWSATW315

Trust: 0.8

title:HS11-008url:http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS11-008/index.html

Trust: 0.8

title:HS11-009url:http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS11-009/index.html

Trust: 0.8

title:HS11-010url:http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS11-010/index.html

Trust: 0.8

title:HS11-003url:http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS11-003/index.html

Trust: 0.8

title:HPSBUX02685url:http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c02775276

Trust: 0.8

title:HPSBUX02642url:http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c02746026

Trust: 0.8

title:HPSBUX02633url:http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c02729756

Trust: 0.8

title:HPSBUX02641url:http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c02738573

Trust: 0.8

title:HPSBUX02645url:http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c02752210

Trust: 0.8

title:HPSBTU02684url:http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c02826781

Trust: 0.8

title:1469482url:http://www-01.ibm.com/support/docview.wss?uid=swg21469482

Trust: 0.8

title:1468197url:http://www-01.ibm.com/support/docview.wss?uid=swg21468197

Trust: 0.8

title:javacpufeb2011-304611url:http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html

Trust: 0.8

title:cpuapr2011-301950url:http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html

Trust: 0.8

title:alert-cve-2010-4476-305811url:http://www.oracle.com/technetwork/topics/security/alert-cve-2010-4476-305811.html

Trust: 0.8

title:RHSA-2011:0336url:https://rhn.redhat.com/errata/RHSA-2011-0336.html

Trust: 0.8

title:RHSA-2011:0214url:https://rhn.redhat.com/errata/RHSA-2011-0214.html

Trust: 0.8

title:RHSA-2011:0282url:https://rhn.redhat.com/errata/RHSA-2011-0282.html

Trust: 0.8

title:RHSA-2011:0335url:https://rhn.redhat.com/errata/RHSA-2011-0335.html

Trust: 0.8

title:security_alert_for_cve-2010-44url:http://blogs.oracle.com/security/2011/02/security_alert_for_cve-2010-44.html

Trust: 0.8

title:april_2011_critical_patch_updaurl:http://blogs.oracle.com/security/2011/04/april_2011_critical_patch_upda.html

Trust: 0.8

title:VMSA-2011-0013url:http://www.vmware.com/jp/support/support-resources/advisories/VMSA-2011-0013.html

Trust: 0.8

title:HS11-008url:http://www.hitachi.co.jp/Prod/comp/soft1/security/info/vuls/HS11-008/index.html

Trust: 0.8

title:HS11-009url:http://www.hitachi.co.jp/Prod/comp/soft1/security/info/vuls/HS11-009/index.html

Trust: 0.8

title:HS11-010url:http://www.hitachi.co.jp/Prod/comp/soft1/security/info/vuls/HS11-010/index.html

Trust: 0.8

title:HS11-003url:http://www.hitachi.co.jp/Prod/comp/soft1/security/info/vuls/HS11-003/index.html

Trust: 0.8

title:interstage_as_201101url:http://software.fujitsu.com/jp/security/products-fujitsu/solution/interstage_as_201101.html

Trust: 0.8

title:Denial of Service Security Exposureurl:https://www-304.ibm.com/support/docview.wss?uid=wws11f1aa50037313ea7852578450082883b

Trust: 0.8

title:Debian Security Advisories: DSA-2161-1 openjdk-6 -- denial of serviceurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=8a0fbd8ef02c50b965cd7461fe7f588d

Trust: 0.1

title:Ubuntu Security Notice: openjdk-6b18 vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-1079-3

Trust: 0.1

title:Ubuntu Security Notice: openjdk-6 vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-1079-1

Trust: 0.1

title:Ubuntu Security Notice: openjdk-6b18 vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-1079-2

Trust: 0.1

title:VMware Security Advisories: VMware third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESXurl:https://vulmon.com/vendoradvisory?qidtp=vmware_security_advisories&qid=31eb28d4d81f5dda33b13bdc58dfe8fb

Trust: 0.1

sources: VULMON: CVE-2010-4476 // JVNDB: JVNDB-2011-000017 // JVNDB: JVNDB-2011-001185 // JVNDB: JVNDB-2011-000020

EXTERNAL IDS

db:NVDid:CVE-2010-4476

Trust: 5.5

db:SECUNIAid:43295

Trust: 2.7

db:SECTRACKid:1025062

Trust: 2.7

db:SECUNIAid:43304

Trust: 1.9

db:SECUNIAid:43280

Trust: 1.9

db:JVNid:JVN26301278

Trust: 1.6

db:HITACHIid:HS11-003

Trust: 1.4

db:BIDid:46091

Trust: 1.2

db:SECUNIAid:43400

Trust: 1.1

db:SECUNIAid:45022

Trust: 1.1

db:SECUNIAid:43333

Trust: 1.1

db:SECUNIAid:43048

Trust: 1.1

db:SECUNIAid:44954

Trust: 1.1

db:SECUNIAid:45555

Trust: 1.1

db:SECUNIAid:43659

Trust: 1.1

db:SECUNIAid:43378

Trust: 1.1

db:SECUNIAid:49198

Trust: 1.1

db:VUPENid:ADV-2011-0605

Trust: 1.1

db:VUPENid:ADV-2011-0422

Trust: 1.1

db:VUPENid:ADV-2011-0434

Trust: 1.1

db:VUPENid:ADV-2011-0365

Trust: 1.1

db:VUPENid:ADV-2011-0377

Trust: 1.1

db:VUPENid:ADV-2011-0379

Trust: 1.1

db:SECUNIAid:43194

Trust: 0.9

db:JVNDBid:JVNDB-2011-000017

Trust: 0.8

db:JVNid:JVN16308183

Trust: 0.8

db:JVNid:JVN97334690

Trust: 0.8

db:SECUNIAid:44303

Trust: 0.8

db:SECUNIAid:43262

Trust: 0.8

db:SECUNIAid:43198

Trust: 0.8

db:VUPENid:ADV-2011-0405

Trust: 0.8

db:VUPENid:ADV-2011-0339

Trust: 0.8

db:VUPENid:ADV-2011-1051

Trust: 0.8

db:VUPENid:ADV-2011-0294

Trust: 0.8

db:JVNDBid:JVNDB-2011-001185

Trust: 0.8

db:JVNid:JVN81294135

Trust: 0.8

db:JVNDBid:JVNDB-2011-000020

Trust: 0.8

db:CNNVDid:CNNVD-201102-241

Trust: 0.6

db:HITACHIid:HS11-009

Trust: 0.3

db:HITACHIid:HS11-010

Trust: 0.3

db:HITACHIid:HS11-008

Trust: 0.3

db:EXPLOIT-DBid:35304

Trust: 0.1

db:VULMONid:CVE-2010-4476

Trust: 0.1

db:PACKETSTORMid:121037

Trust: 0.1

db:PACKETSTORMid:127267

Trust: 0.1

db:PACKETSTORMid:102969

Trust: 0.1

db:PACKETSTORMid:114812

Trust: 0.1

db:PACKETSTORMid:99459

Trust: 0.1

db:PACKETSTORMid:102374

Trust: 0.1

db:PACKETSTORMid:98795

Trust: 0.1

db:PACKETSTORMid:98203

Trust: 0.1

db:PACKETSTORMid:101245

Trust: 0.1

db:PACKETSTORMid:99798

Trust: 0.1

db:PACKETSTORMid:112826

Trust: 0.1

db:PACKETSTORMid:111920

Trust: 0.1

sources: VULMON: CVE-2010-4476 // BID: 46091 // PACKETSTORM: 121037 // PACKETSTORM: 127267 // PACKETSTORM: 102969 // PACKETSTORM: 114812 // PACKETSTORM: 99459 // PACKETSTORM: 102374 // PACKETSTORM: 98795 // PACKETSTORM: 98203 // PACKETSTORM: 101245 // PACKETSTORM: 99798 // PACKETSTORM: 112826 // PACKETSTORM: 111920 // CNNVD: CNNVD-201102-241 // JVNDB: JVNDB-2011-000017 // JVNDB: JVNDB-2011-001185 // JVNDB: JVNDB-2011-000020 // NVD: CVE-2010-4476

REFERENCES

url:http://secunia.com/advisories/43295

Trust: 2.7

url:http://www.securitytracker.com/id?1025062

Trust: 2.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-4476

Trust: 2.5

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2010-4476

Trust: 2.4

url:http://secunia.com/advisories/43280

Trust: 1.9

url:http://secunia.com/advisories/43304

Trust: 1.9

url:http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html

Trust: 1.4

url:http://www.oracle.com/technetwork/topics/security/alert-cve-2010-4476-305811.html

Trust: 1.4

url:http://www.exploringbinary.com/java-hangs-when-converting-2-2250738585072012e-308/

Trust: 1.4

url:http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html

Trust: 1.4

url:http://www.hitachi.co.jp/prod/comp/soft1/global/security/info/vuls/hs11-003/index.html

Trust: 1.4

url:http://security.gentoo.org/glsa/glsa-201406-32.xml

Trust: 1.2

url:http://www.redhat.com/support/errata/rhsa-2011-0214.html

Trust: 1.1

url:http://www-01.ibm.com/support/docview.wss?uid=swg1pm31983

Trust: 1.1

url:http://lists.fedoraproject.org/pipermail/package-announce/2011-february/053926.html

Trust: 1.1

url:http://www.debian.org/security/2011/dsa-2161

Trust: 1.1

url:http://www.redhat.com/support/errata/rhsa-2011-0282.html

Trust: 1.1

url:http://secunia.com/advisories/43400

Trust: 1.1

url:http://www.vupen.com/english/advisories/2011/0422

Trust: 1.1

url:http://www.redhat.com/support/errata/rhsa-2011-0211.html

Trust: 1.1

url:http://www-01.ibm.com/support/docview.wss?uid=swg1iz94423

Trust: 1.1

url:http://www.vupen.com/english/advisories/2011/0434

Trust: 1.1

url:http://www.redhat.com/support/errata/rhsa-2011-0213.html

Trust: 1.1

url:http://www-01.ibm.com/support/docview.wss?uid=swg21468358

Trust: 1.1

url:http://lists.fedoraproject.org/pipermail/package-announce/2011-february/053934.html

Trust: 1.1

url:http://www13.itrc.hp.com/service/cki/docdisplay.do?docid=emr_na-c02720715&admit=109447627+1298159618320+28353475

Trust: 1.1

url:http://www.vupen.com/english/advisories/2011/0365

Trust: 1.1

url:http://secunia.com/advisories/43378

Trust: 1.1

url:http://www.vupen.com/english/advisories/2011/0379

Trust: 1.1

url:http://www.redhat.com/support/errata/rhsa-2011-0212.html

Trust: 1.1

url:http://blogs.oracle.com/security/2011/02/security_alert_for_cve-2010-44.html

Trust: 1.1

url:http://www.vupen.com/english/advisories/2011/0377

Trust: 1.1

url:http://www.redhat.com/support/errata/rhsa-2011-0210.html

Trust: 1.1

url:http://blog.fortify.com/blog/2011/02/08/double-trouble

Trust: 1.1

url:http://secunia.com/advisories/43048

Trust: 1.1

url:http://secunia.com/advisories/43333

Trust: 1.1

url:http://www.redhat.com/support/errata/rhsa-2011-0334.html

Trust: 1.1

url:http://www.redhat.com/support/errata/rhsa-2011-0333.html

Trust: 1.1

url:http://secunia.com/advisories/45555

Trust: 1.1

url:http://www.ibm.com/support/docview.wss?uid=swg24029498

Trust: 1.1

url:http://www.ibm.com/support/docview.wss?uid=swg24029497

Trust: 1.1

url:http://www.redhat.com/support/errata/rhsa-2011-0880.html

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=130514352726432&w=2

Trust: 1.1

url:http://www.mandriva.com/security/advisories?name=mdvsa-2011:054

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=131041767210772&w=2

Trust: 1.1

url:http://www.vupen.com/english/advisories/2011/0605

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=129960314701922&w=2

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00004.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00010.html

Trust: 1.1

url:http://secunia.com/advisories/43659

Trust: 1.1

url:http://secunia.com/advisories/44954

Trust: 1.1

url:http://secunia.com/advisories/45022

Trust: 1.1

url:http://support.novell.com/docs/readmes/infodocument/patchbuilder/readme_5098550.html

Trust: 1.1

url:http://secunia.com/advisories/49198

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=132215163318824&w=2

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=136485229118404&w=2

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=134254957702612&w=2

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=130270785502599&w=2

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=130497185606818&w=2

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=133469267822771&w=2

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=130497132406206&w=2

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=129899347607632&w=2

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=133728004526190&w=2

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=130168502603566&w=2

Trust: 1.1

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a19493

Trust: 1.1

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a14589

Trust: 1.1

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a14328

Trust: 1.1

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a12745

Trust: 1.1

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a12662

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=134254866602253&w=2

Trust: 1.1

url:http://www.securityfocus.com/bid/46091

Trust: 0.9

url:https://nvd.nist.gov/vuln/detail/cve-2010-4476

Trust: 0.9

url:http://jvn.jp/en/jp/jvn26301278/index.html

Trust: 0.8

url:http://jvn.jp/jp/jvn97334690/index.html

Trust: 0.8

url:http://jvn.jp/cert/jvnvu584356/index.html

Trust: 0.8

url:http://jvn.jp/jp/jvn16308183/index.html

Trust: 0.8

url:http://jvn.jp/jp/jvn26301278/index.html

Trust: 0.8

url:http://jvn.jp/tr/jvntr-2011-02

Trust: 0.8

url:http://secunia.com/advisories/43198

Trust: 0.8

url:http://secunia.com/advisories/43262

Trust: 0.8

url:http://secunia.com/advisories/44303

Trust: 0.8

url:http://secunia.com/advisories/43194

Trust: 0.8

url:http://www.vupen.com/english/advisories/2011/0294

Trust: 0.8

url:http://www.vupen.com/english/advisories/2011/0339

Trust: 0.8

url:http://www.vupen.com/english/advisories/2011/1051

Trust: 0.8

url:http://www.vupen.com/english/advisories/2011/0405

Trust: 0.8

url:http://jvn.jp/en/jp/jvn81294135/index.html

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2010-4448

Trust: 0.7

url:http://www-01.ibm.com/support/docview.wss?uid=swg21468884

Trust: 0.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21469222

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2010-4465

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2010-4469

Trust: 0.6

url:http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2010-4470

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2010-4450

Trust: 0.5

url:http://h20566.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2010-4471

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2010-4472

Trust: 0.4

url:https://www-304.ibm.com/support/docview.wss?uid=swg24030795

Trust: 0.3

url:http://www.novell.com/support/viewcontent.do?externalid=7008129

Trust: 0.3

url:http://www.ibm.com/support/docview.wss?uid=swg21509635

Trust: 0.3

url:http://www.ibm.com/support/docview.wss?uid=swg21468287

Trust: 0.3

url:https://h20392.www2.hp.com/portal/swdepot/displayproductinfo.do?productnumber=hpuxfpupdater

Trust: 0.3

url:http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?objectid=c02752210

Trust: 0.3

url:http://h20565.www2.hp.com/portal/site/hpsc/public/kb/docdisplay/?docid=emr_na-c03090723&ac.admitted=1321942068127.876444892.492883150

Trust: 0.3

url:http://www.novell.com/support/viewcontent.do?externalid=7009249

Trust: 0.3

url:https://www-304.ibm.com/support/docview.wss?uid=swg21469285

Trust: 0.3

url:http://www.fujitsu.com/global/support/software/security/products-f/interstage-201101e.html

Trust: 0.3

url:http://www.ibm.com/support/docview.wss?uid=ssg1s1003877

Trust: 0.3

url:https://www-304.ibm.com/support/docview.wss?uid=swg1oa35932

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg24029090

Trust: 0.3

url:http://support.attachmate.com/techdocs/1704.html

Trust: 0.3

url:http://java.sun.com

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21468728

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg24032592

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21474615

Trust: 0.3

url:https://www-304.ibm.com/support/docview.wss?uid=swg24029498

Trust: 0.3

url:https://www-304.ibm.com/support/docview.wss?uid=swg24029497

Trust: 0.3

url:http://www.ibm.com/support/docview.wss?uid=swg24029827

Trust: 0.3

url:/archive/1/516213

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21469074

Trust: 0.3

url:http://support.avaya.com/css/p8/documents/100127618

Trust: 0.3

url:http://support.avaya.com/css/p8/documents/100128342

Trust: 0.3

url:http://support.avaya.com/css/p8/documents/100131812

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21469482

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21469001

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21469261

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21468267

Trust: 0.3

url:https://www-304.ibm.com/support/docview.wss?uid=swg21508061

Trust: 0.3

url:http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?objectid=c02906075

Trust: 0.3

url:http://www11.itrc.hp.com/service/cki/docdisplay.do?docid=emr_na-c02720715

Trust: 0.3

url:http://itrc.hp.com/service/cki/docdisplay.do?docid=emr_na-c02738573

Trust: 0.3

url:http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?objectid=c03358587

Trust: 0.3

url:http://www.hitachi.co.jp/prod/comp/soft1/security/info/vuls/hs11-008/index.html

Trust: 0.3

url:http://www.hitachi.co.jp/prod/comp/soft1/security/info/vuls/hs11-009/index.html

Trust: 0.3

url:http://www.hitachi.co.jp/prod/comp/soft1/security/info/vuls/hs11-010/index.html

Trust: 0.3

url:http://www.ibm.com/developerworks/java/jdk/alerts/cve-2010-4476.html

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=nas2a5e8722f285b693586257837004234f7

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=nas239097234bdef0f0086257837004234ff

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=nas2e3651fd2836659b88625783700423505

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=nas2bbd9eef75e33a6ec862578370042350b

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=nas24394745ae41518b88625783700423513

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=nas274b0e6114eba807a8625783700423519

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=nas22c04013ef2a6aba98625783700423520

Trust: 0.3

url:https://www-304.ibm.com/support/docview.wss?uid=swg21468291

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg1iz94331

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21469266

Trust: 0.3

url:http://www.ibm.com/support/docview.wss?uid=swg21469046

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21469229

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21468927

Trust: 0.3

url:https://www-304.ibm.com/support/docview.wss?uid=swg24029823

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21468987

Trust: 0.3

url:https://rhn.redhat.com/errata/rhsa-2011-0334.html

Trust: 0.3

url:https://rhn.redhat.com/errata/rhsa-2011-0333.html

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21468915

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21468912

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21469042

Trust: 0.3

url:http://support.attachmate.com/techdocs/2566.html

Trust: 0.3

url:http://support.attachmate.com/techdocs/2564.html

Trust: 0.3

url:http://support.attachmate.com/techdocs/2560.html

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21468521

Trust: 0.3

url:http://www.novell.com/support/viewcontent.do?externalid=7008485

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21468705

Trust: 0.3

url:https://www-304.ibm.com/support/docview.wss?uid=isg400000547

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg24033364

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg24032885

Trust: 0.3

url:https://www-304.ibm.com/support/docview.wss?uid=swg24029766

Trust: 0.3

url:https://www-304.ibm.com/support/docview.wss?uid=swg24029768

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg24029502

Trust: 0.3

url:https://www.hp.com/go/swa

Trust: 0.3

url:https://h20566.www2.hp.com/portal/site/hpsc/public/kb/

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2009-3555

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2010-4454

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2010-4447

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2011-0706

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2011-2204

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2009-0033

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2009-3548

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2011-2526

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2009-2902

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2011-3190

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2009-0580

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2009-2693

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2009-0781

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2011-1184

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2010-1157

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2011-2729

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2010-3562

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2010-3568

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2010-3541

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2010-3566

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2010-3569

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2010-3573

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2010-3548

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2010-3549

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2010-3565

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2010-3574

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2010-3553

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2010-4467

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2010-4351

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2010-3551

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2010-3557

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2010-4452

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2011-0815

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2011-0814

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2010-4462

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2010-4422

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2011-0862

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2010-4475

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2010-4473

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2011-0802

Trust: 0.2

url:https://cwe.mitre.org/data/definitions/.html

Trust: 0.1

url:https://www.debian.org/security/./dsa-2161

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://www.exploit-db.com/exploits/35304/

Trust: 0.1

url:https://usn.ubuntu.com/1079-3/

Trust: 0.1

url:http://tools.cisco.com/security/center/viewalert.x?alertid=22468

Trust: 0.1

url:https://h20392.www2.hp.com/portal

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-3718

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-4858

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-2227

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-0022

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-5515

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-0783

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-5885

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-0013

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3574

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3423

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3548

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3565

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2469

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0864

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3553

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2443

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1717

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-2412

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1716

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0505

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1518

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2419

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3557

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-2414

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4450

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-3829

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5829

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5804

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1485

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5806

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5087

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2422

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0865

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4471

Trust: 0.1

url:http://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5075

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3557

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2426

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-3567

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-4002

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5084

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1711

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1478

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2461

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5820

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5979

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-6954

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2470

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4476

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0547

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4540

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0429

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0441

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2451

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2459

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5823

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-2421

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0870

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3554

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0862

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2460

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1713

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0706

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0434

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5784

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5830

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3561

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5800

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4467

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3567

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2456

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5803

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4465

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4472

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5086

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3556

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0425

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2383

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2423

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2447

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2452

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2445

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2450

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5778

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5780

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5073

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3568

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3548

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1493

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2446

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5069

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-5035

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3549

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1500

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3562

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3571

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3555

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0426

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0457

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5850

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-2783

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3573

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3552

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0451

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0459

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-2423

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-1876

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2384

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4469

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0431

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1557

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0458

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2548

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2453

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4448

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3521

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0401

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5085

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2407

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2421

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-3564

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2429

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3569

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-2403

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5068

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-2548

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0871

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5071

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-2398

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0432

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0815

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0444

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1475

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0497

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5774

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5782

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-3554

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1725

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5790

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5805

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3564

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5802

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5849

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1719

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0461

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0442

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2448

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2458

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0427

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-2427

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5825

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0506

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1484

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2430

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3541

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2415

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0872

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3216

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0429

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1718

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5772

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-3860

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3422

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0433

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5074

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3554

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2454

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2444

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5072

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4470

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2436

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4416

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0822

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1537

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3551

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2449

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0503

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0025

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2457

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1476

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0169

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0424

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3563

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0809

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5077

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0435

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3544

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0456

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1723

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1726

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0450

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1571

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0460

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5081

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3547

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5840

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5851

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2465

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2431

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2473

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-6629

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5783

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2783

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2463

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3560

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2412

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5809

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1480

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4351

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2420

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0501

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0428

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0869

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2417

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2471

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3566

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3551

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2424

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5076

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5842

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-2397

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0452

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3553

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1569

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1724

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3558

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5797

Trust: 0.1

url:http://security.gentoo.org/

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5070

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1486

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2472

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0446

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0453

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3860

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1488

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0502

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-3561

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0868

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0440

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0443

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3389

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5814

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5817

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2455

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5089

Trust: 0.1

url:http://support.openview.hp.com/selfsolve/patches

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-4474

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-0817

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-4468

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-4466

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-0786

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-4463

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-0788

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-4451

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/o/openjdk-6b18/icedtea-6-jre-cacao_6b18-1.8.7-0ubuntu2.1_armel.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6b18/openjdk-6b18_6b18-1.8.7-0ubuntu2.1.diff.gz

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/o/openjdk-6b18/openjdk-6-jdk_6b18-1.8.7-0ubuntu2.1_armel.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6b18/openjdk-6b18_6b18-1.8.7.orig.tar.gz

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/o/openjdk-6b18/openjdk-6-demo_6b18-1.8.7-0ubuntu2.1_armel.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/o/openjdk-6b18/openjdk-6-jre-headless_6b18-1.8.7-0ubuntu2.1_armel.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6b18/openjdk-6b18_6b18-1.8.7-0ubuntu2.1.dsc

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/o/openjdk-6b18/openjdk-6-dbg_6b18-1.8.7-0ubuntu2.1_armel.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/o/openjdk-6b18/icedtea6-plugin_6b18-1.8.7-0ubuntu2.1_armel.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/universe/o/openjdk-6b18/openjdk-6-jre-zero_6b18-1.8.7-0ubuntu2.1_armel.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/o/openjdk-6b18/openjdk-6-jre_6b18-1.8.7-0ubuntu2.1_armel.deb

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2010-3550.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2010-3568.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2010-3574.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2010-3556.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2010-4468.html

Trust: 0.1

url:https://access.redhat.com/kb/docs/doc-11259

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2010-3548.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2010-3563.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-3563

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2010-4476.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2010-3551.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2010-3560.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2010-1321.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2010-3569.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2010-4447.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-3560

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2010-3558.html

Trust: 0.1

url:https://access.redhat.com/security/updates/classification/#low

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2010-4452.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2010-3549.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2010-4462.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-3558

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2010-3566.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-3555

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2010-4422.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2010-3571.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2010-4475.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2010-4473.html

Trust: 0.1

url:https://access.redhat.com/security/team/contact/

Trust: 0.1

url:http://www.ibm.com/developerworks/java/jdk/alerts/

Trust: 0.1

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2010-3572.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2009-3555.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2010-3573.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2010-3541.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2010-4463.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-3556

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2010-4454.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-1321

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-3550

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-3572

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2010-3562.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2010-4448.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2010-4467.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2010-4471.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-3571

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2010-4465.html

Trust: 0.1

url:https://access.redhat.com/security/team/key/#package

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2010-4466.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2010-3557.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2010-3565.html

Trust: 0.1

url:http://bugzilla.redhat.com/):

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2010-3555.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2010-3553.html

Trust: 0.1

url:https://rhn.redhat.com/errata/rhsa-2011-0880.html

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6_6b20-1.9.7-0ubuntu1~9.10.1.diff.gz

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6-demo_6b20-1.9.7-0ubuntu1~10.04.1_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/o/openjdk-6/openjdk-6-dbg_6b20-1.9.7-0ubuntu1~10.04.1_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6-jre-lib_6b20-1.9.7-0ubuntu1~9.10.1_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6-dbg_6b20-1.9.7-0ubuntu1~10.04.1_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6_6b20-1.9.7.orig.tar.gz

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/icedtea-6-jre-cacao_6b20-1.9.7-0ubuntu1_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/o/openjdk-6/icedtea6-plugin_6b20-1.9.7-0ubuntu1~10.04.1_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/universe/o/openjdk-6/openjdk-6-jre-zero_6b20-1.9.7-0ubuntu1_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6_6b20-1.9.7-0ubuntu1.diff.gz

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/o/openjdk-6/openjdk-6-jre_6b20-1.9.7-0ubuntu1~10.04.1_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6-demo_6b20-1.9.7-0ubuntu1_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6-jre_6b20-1.9.7-0ubuntu1_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6-jdk_6b20-1.9.7-0ubuntu1_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/o/openjdk-6/openjdk-6-jre-zero_6b20-1.9.7-0ubuntu1~9.10.1_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/o/openjdk-6/icedtea6-plugin_6b20-1.9.7-0ubuntu1~9.10.1_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6_6b20-1.9.7-0ubuntu1~9.10.1.dsc

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/o/openjdk-6/openjdk-6-jdk_6b20-1.9.7-0ubuntu1~10.04.1_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/icedtea-6-jre-cacao_6b20-1.9.7-0ubuntu1_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/icedtea-6-jre-cacao_6b20-1.9.7-0ubuntu1~9.10.1_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/o/openjdk-6/openjdk-6-jre-zero_6b20-1.9.7-0ubuntu1~10.04.1_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/o/openjdk-6/icedtea-6-jre-cacao_6b20-1.9.7-0ubuntu1~9.10.1_lpia.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/o/openjdk-6/openjdk-6-jre-headless_6b20-1.9.7-0ubuntu1~10.04.1_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/o/openjdk-6/openjdk-6-jre-headless_6b20-1.9.7-0ubuntu1~9.10.1_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6-demo_6b20-1.9.7-0ubuntu1~9.10.1_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6-jre-headless_6b20-1.9.7-0ubuntu1~10.04.1_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/o/openjdk-6/openjdk-6-jdk_6b20-1.9.7-0ubuntu1~9.10.1_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/o/openjdk-6/openjdk-6-jdk_6b20-1.9.7-0ubuntu1~9.10.1_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6_6b20-1.9.7-0ubuntu1~10.04.1.diff.gz

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/icedtea-6-jre-cacao_6b20-1.9.7-0ubuntu1~10.04.1_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/o/openjdk-6/openjdk-6-dbg_6b20-1.9.7-0ubuntu1_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6-doc_6b20-1.9.7-0ubuntu1_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/o/openjdk-6/openjdk-6-jre-zero_6b20-1.9.7-0ubuntu1_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/o/openjdk-6/openjdk-6-jdk_6b20-1.9.7-0ubuntu1_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/o/openjdk-6/openjdk-6-dbg_6b20-1.9.7-0ubuntu1~9.10.1_lpia.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/universe/o/openjdk-6/openjdk-6-jre-zero_6b20-1.9.7-0ubuntu1~9.10.1_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6-source_6b20-1.9.7-0ubuntu1_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6-jre-headless_6b20-1.9.7-0ubuntu1_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/o/openjdk-6/openjdk-6-dbg_6b20-1.9.7-0ubuntu1~9.10.1_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/o/openjdk-6/openjdk-6-jre-headless_6b20-1.9.7-0ubuntu1_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/icedtea6-plugin_6b20-1.9.7-0ubuntu1~9.10.1_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/icedtea6-plugin_6b20-1.9.7-0ubuntu1~10.04.1_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6-demo_6b20-1.9.7-0ubuntu1_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/o/openjdk-6/openjdk-6-jre-zero_6b20-1.9.7-0ubuntu1~10.04.1_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/icedtea-6-jre-cacao_6b20-1.9.7-0ubuntu1~9.10.1_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/o/openjdk-6/openjdk-6-demo_6b20-1.9.7-0ubuntu1~9.10.1_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6-dbg_6b20-1.9.7-0ubuntu1~9.10.1_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6-dbg_6b20-1.9.7-0ubuntu1~9.10.1_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/universe/o/openjdk-6/openjdk-6-jre-zero_6b20-1.9.7-0ubuntu1~10.04.1_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/icedtea6-plugin_6b20-1.9.7-0ubuntu1_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/icedtea6-plugin_6b20-1.9.7-0ubuntu1_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6-jre-headless_6b20-1.9.7-0ubuntu1~9.10.1_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/o/openjdk-6/icedtea-6-jre-cacao_6b20-1.9.7-0ubuntu1_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6-jdk_6b20-1.9.7-0ubuntu1_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6-dbg_6b20-1.9.7-0ubuntu1_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/o/openjdk-6/openjdk-6-demo_6b20-1.9.7-0ubuntu1~9.10.1_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6_6b20-1.9.7-0ubuntu1.dsc

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/o/openjdk-6/openjdk-6-jre_6b20-1.9.7-0ubuntu1~9.10.1_lpia.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/o/openjdk-6/icedtea6-plugin_6b20-1.9.7-0ubuntu1~9.10.1_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/o/openjdk-6/openjdk-6-demo_6b20-1.9.7-0ubuntu1~10.04.1_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/o/openjdk-6/openjdk-6-jre-zero_6b20-1.9.7-0ubuntu1~9.10.1_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6-source_6b20-1.9.7-0ubuntu1~9.10.1_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6-jdk_6b20-1.9.7-0ubuntu1~9.10.1_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6-jre_6b20-1.9.7-0ubuntu1~10.04.1_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/o/openjdk-6/openjdk-6-jre-zero_6b20-1.9.7-0ubuntu1_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/o/openjdk-6/openjdk-6-jdk_6b20-1.9.7-0ubuntu1~10.04.1_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/icedtea6-plugin_6b20-1.9.7-0ubuntu1~10.04.1_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6-jre_6b20-1.9.7-0ubuntu1_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6-demo_6b20-1.9.7-0ubuntu1~10.04.1_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/o/openjdk-6/openjdk-6-jre_6b20-1.9.7-0ubuntu1~10.04.1_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6_6b20-1.9.7-0ubuntu1~10.04.1.dsc

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6-jdk_6b20-1.9.7-0ubuntu1~10.04.1_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/o/openjdk-6/icedtea-6-jre-cacao_6b20-1.9.7-0ubuntu1~10.04.1_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6-dbg_6b20-1.9.7-0ubuntu1~10.04.1_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/o/openjdk-6/openjdk-6-jre_6b20-1.9.7-0ubuntu1_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6-jre_6b20-1.9.7-0ubuntu1~10.04.1_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6-doc_6b20-1.9.7-0ubuntu1~10.04.1_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6-dbg_6b20-1.9.7-0ubuntu1_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6-demo_6b20-1.9.7-0ubuntu1~9.10.1_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6-jdk_6b20-1.9.7-0ubuntu1~9.10.1_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/o/openjdk-6/openjdk-6-demo_6b20-1.9.7-0ubuntu1~10.04.1_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/icedtea6-plugin_6b20-1.9.7-0ubuntu1~9.10.1_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6-jre-lib_6b20-1.9.7-0ubuntu1_all.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/o/openjdk-6/icedtea6-plugin_6b20-1.9.7-0ubuntu1~10.04.1_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6-doc_6b20-1.9.7-0ubuntu1~9.10.1_all.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/o/openjdk-6/icedtea6-plugin_6b20-1.9.7-0ubuntu1_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/o/openjdk-6/openjdk-6-dbg_6b20-1.9.7-0ubuntu1~10.04.1_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6-jre_6b20-1.9.7-0ubuntu1~9.10.1_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6-jre_6b20-1.9.7-0ubuntu1~9.10.1_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/icedtea-6-jre-cacao_6b20-1.9.7-0ubuntu1~10.04.1_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6-jre-headless_6b20-1.9.7-0ubuntu1_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/o/openjdk-6/openjdk-6-jre_6b20-1.9.7-0ubuntu1~9.10.1_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/o/openjdk-6/openjdk-6-demo_6b20-1.9.7-0ubuntu1_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6-jre-lib_6b20-1.9.7-0ubuntu1~10.04.1_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6-source_6b20-1.9.7-0ubuntu1~10.04.1_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6-jdk_6b20-1.9.7-0ubuntu1~10.04.1_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6-jre-headless_6b20-1.9.7-0ubuntu1~10.04.1_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/o/openjdk-6/openjdk-6-jre-headless_6b20-1.9.7-0ubuntu1~9.10.1_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/o/openjdk-6/openjdk-6-jre-headless_6b20-1.9.7-0ubuntu1~9.10.1_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/o/openjdk-6/openjdk-6-jre-headless_6b20-1.9.7-0ubuntu1~10.04.1_powerpc.deb

Trust: 0.1

url:http://secunia.com/products/corporate/evm/

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/advisories/43194/#comments

Trust: 0.1

url:http://secunia.com/products/corporate/vim/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=43194

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/43194/

Trust: 0.1

url:http://tomcat.apache.org/security-6.html

Trust: 0.1

url:http://tomcat.apache.org/security-7.html

Trust: 0.1

url:http://www.itrc.hp.com/service/cki/secbullarchive.do

Trust: 0.1

url:http://h18012.www1.hp.com/java/alpha/fpupdater_index.html

Trust: 0.1

url:http://h30046.www3.hp.com/driveralertprofile.php?regioncode=na&langcode=useng&jumpid=in_sc-gen__driveritrc&topiccode=itrc

Trust: 0.1

url:http://h30046.www3.hp.com/subsignin.php

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-0025

Trust: 0.1

url:http://store.mandriva.com/product_info.php?cpath=149&amp;products_id=490

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-4448

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-0025

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-4465

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-4470

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-4472

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-4469

Trust: 0.1

url:http://www.mandriva.com/security/

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-4450

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-4471

Trust: 0.1

url:http://www.mandriva.com/security/advisories

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-0706

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-4351

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3549

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-0865

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3563

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-0864

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3545

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3560

Trust: 0.1

url:http://www.hp.com/go/java

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3552

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-0499

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3389

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3556

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3557

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3548

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-0867

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-0871

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3547

Trust: 0.1

url:http://h71000.www7.hp.com/openvms/products/ips/apache/csws_java.html

Trust: 0.1

url:https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docdisplay/?docid=emr_na-c02964430

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-2901

Trust: 0.1

sources: VULMON: CVE-2010-4476 // BID: 46091 // PACKETSTORM: 121037 // PACKETSTORM: 127267 // PACKETSTORM: 102969 // PACKETSTORM: 114812 // PACKETSTORM: 99459 // PACKETSTORM: 102374 // PACKETSTORM: 98795 // PACKETSTORM: 98203 // PACKETSTORM: 101245 // PACKETSTORM: 99798 // PACKETSTORM: 112826 // PACKETSTORM: 111920 // JVNDB: JVNDB-2011-000017 // JVNDB: JVNDB-2011-001185 // JVNDB: JVNDB-2011-000020 // NVD: CVE-2010-4476

CREDITS

HP

Trust: 0.6

sources: PACKETSTORM: 121037 // PACKETSTORM: 102969 // PACKETSTORM: 114812 // PACKETSTORM: 101245 // PACKETSTORM: 112826 // PACKETSTORM: 111920

SOURCES

db:VULMONid:CVE-2010-4476
db:BIDid:46091
db:PACKETSTORMid:121037
db:PACKETSTORMid:127267
db:PACKETSTORMid:102969
db:PACKETSTORMid:114812
db:PACKETSTORMid:99459
db:PACKETSTORMid:102374
db:PACKETSTORMid:98795
db:PACKETSTORMid:98203
db:PACKETSTORMid:101245
db:PACKETSTORMid:99798
db:PACKETSTORMid:112826
db:PACKETSTORMid:111920
db:CNNVDid:CNNVD-201102-241
db:JVNDBid:JVNDB-2011-000017
db:JVNDBid:JVNDB-2011-001185
db:JVNDBid:JVNDB-2011-000020
db:NVDid:CVE-2010-4476

LAST UPDATE DATE

2026-03-26T22:37:54.961000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2010-4476date:2018-10-30T00:00:00
db:BIDid:46091date:2015-04-13T21:31:00
db:CNNVDid:CNNVD-201102-241date:2011-02-24T00:00:00
db:JVNDBid:JVNDB-2011-000017date:2018-02-07T00:00:00
db:JVNDBid:JVNDB-2011-001185date:2018-02-07T00:00:00
db:JVNDBid:JVNDB-2011-000020date:2018-02-07T00:00:00
db:NVDid:CVE-2010-4476date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:VULMONid:CVE-2010-4476date:2011-02-17T00:00:00
db:BIDid:46091date:2011-02-01T00:00:00
db:PACKETSTORMid:121037date:2013-04-01T15:55:00
db:PACKETSTORMid:127267date:2014-06-30T23:39:28
db:PACKETSTORMid:102969date:2011-07-12T00:49:57
db:PACKETSTORMid:114812date:2012-07-17T21:49:22
db:PACKETSTORMid:99459date:2011-03-18T21:57:10
db:PACKETSTORMid:102374date:2011-06-17T12:57:44
db:PACKETSTORMid:98795date:2011-03-01T15:08:06
db:PACKETSTORMid:98203date:2011-02-07T04:43:32
db:PACKETSTORMid:101245date:2011-05-09T22:46:47
db:PACKETSTORMid:99798date:2011-03-28T18:56:27
db:PACKETSTORMid:112826date:2012-05-17T21:16:37
db:PACKETSTORMid:111920date:2012-04-17T20:41:11
db:CNNVDid:CNNVD-201102-241date:2011-02-15T00:00:00
db:JVNDBid:JVNDB-2011-000017date:2011-03-04T00:00:00
db:JVNDBid:JVNDB-2011-001185date:2011-03-08T00:00:00
db:JVNDBid:JVNDB-2011-000020date:2011-03-10T00:00:00
db:NVDid:CVE-2010-4476date:2011-02-17T19:00:01.900