ID

VAR-201109-0130


CVE

CVE-2011-3389


TITLE

SSL 3.0 and TLS 1.0 allow chosen plaintext attack in CBC modes

Trust: 0.8

sources: CERT/CC: VU#864643

DESCRIPTION

The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a "BEAST" attack. A vulnerability in the specification of the SSL 3.0 and TLS 1.0 protocols could allow an attacker to decrypt encrypted traffic. This will result in a false sense of security, and potentially result in the disclosure of sensitive information. ---------------------------------------------------------------------- Ovum says ad hoc tools are out-dated. The best practice approach? Fast vulnerability intelligence, threat handling, and setup in one tool. Read the new report on the Secunia VIM: http://secunia.com/products/corporate/vim/ovum_2011_request/ ---------------------------------------------------------------------- TITLE: Hitachi Cosminexus Products Java Multiple Vulnerabilities SECUNIA ADVISORY ID: SA46694 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/46694/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=46694 RELEASE DATE: 2011-11-08 DISCUSS ADVISORY: http://secunia.com/advisories/46694/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/46694/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=46694 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: Hitachi has acknowledged multiple vulnerabilities in Hitachi Cosminexus products, which can be exploited by malicious users to disclose certain information and by malicious people to disclose potentially sensitive information, hijack a user's session, conduct DNS cache poisoning attacks, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system. The vulnerabilities are caused due to vulnerabilities in the bundled version of Cosminexus Developer's Kit for Java. For more information: SA46512 Please see the vendor's advisory for a list of affected products. SOLUTION: Update to a fixed version. Please see the vendor's advisory for details. ORIGINAL ADVISORY: http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS11-024/index.html OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . Background ========== IcedTea is a distribution of the Java OpenJDK source code built with free build tools. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 APPLE-SA-2012-07-25-2 Xcode 4.4 Xcode 4.4 is now available and addresses the following: neon Available for: OS X Lion v10.7.4 and later Impact: An attacker may be able to decrypt data protected by SSL Description: There are known attacks on the confidentiality of SSL 3.0 and TLS 1.0 when a cipher suite uses a block cipher in CBC mode. The neon library (used by Subversion) disabled the 'empty fragment' countermeasure which prevented these attacks. This issue is addressed by enabling the countermeasure. CVE-ID CVE-2011-3389 Xcode Available for: OS X Lion v10.7.4 and later Impact: Helper tools built with Xcode allow any App Store application to read their keychain entries Description: All signed programs contain a designated requirement (DR) which states, from the perspective of the developer of the program, what constraints a program needs to satisfy in order to be considered an instance of this program. When a Developer ID was used with Xcode to sign a product that did not have a bundle identifier, such as a command-line tool or an embedded helper, the generated DR for the product did not include the developer's ID in the part of the DR that applies to apps signed by the App Store. As a result, any App Store app may have accessed keychain items created by the product. This is addressed by generating a DR with improved checks. Affected products need to be re-signed with this version of Xcode to include the improved DR. CVE-ID CVE-2012-3698 Xcode 4.4 may be obtained from the Downloads section of the Apple Developer Connection Member site: http://developer.apple.com/ Login is required, and membership is free. Xcode 4.4 is also available from the App Store. It is free to anyone with OS X 10.7.x Lion and later. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201301-01 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: High Title: Mozilla Products: Multiple vulnerabilities Date: January 08, 2013 Bugs: #180159, #181361, #207261, #238535, #246602, #251322, #255221, #255234, #255687, #257577, #260062, #261386, #262704, #267234, #273918, #277752, #280226, #280234, #280393, #282549, #284439, #286721, #290892, #292034, #297532, #305689, #307045, #311021, #312361, #312645, #312651, #312675, #312679, #312763, #313003, #324735, #326341, #329279, #336396, #341821, #342847, #348316, #357057, #360055, #360315, #365323, #373595, #379549, #381245, #388045, #390771, #395431, #401701, #403183, #404437, #408161, #413657, #419917, #427224, #433383, #437780, #439586, #439960, #444318 ID: 201301-01 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities have been found in Mozilla Firefox, Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may allow execution of arbitrary code or local privilege escalation. Background ========== Mozilla Firefox is an open-source web browser and Mozilla Thunderbird an open-source email client, both from the Mozilla Project. The SeaMonkey project is a community effort to deliver production-quality releases of code derived from the application formerly known as the 'Mozilla Application Suite'. XULRunner is a Mozilla runtime package that can be used to bootstrap XUL+XPCOM applications such as Firefox and Thunderbird. NSS is Mozilla's Network Security Services library that implements PKI support. IceCat is the GNU version of Firefox. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 www-client/firefox < 10.0.11 >= 10.0.11 2 www-client/firefox-bin < 10.0.11 >= 10.0.11 3 mail-client/thunderbird < 10.0.11 >= 10.0.11 4 mail-client/thunderbird-bin < 10.0.11 >= 10.0.11 5 www-client/seamonkey < 2.14-r1 >= 2.14-r1 6 www-client/seamonkey-bin < 2.14 >= 2.14 7 dev-libs/nss < 3.14 >= 3.14 8 www-client/mozilla-firefox <= 3.6.8 Vulnerable! 9 www-client/mozilla-firefox-bin <= 3.5.6 Vulnerable! 10 mail-client/mozilla-thunderbird <= 3.0.4-r1 Vulnerable! 11 mail-client/mozilla-thunderbird-bin <= 3.0 Vulnerable! 12 www-client/icecat <= 10.0-r1 Vulnerable! 13 net-libs/xulrunner <= 2.0-r1 Vulnerable! 14 net-libs/xulrunner-bin <= 1.8.1.19 Vulnerable! ------------------------------------------------------------------- NOTE: Certain packages are still vulnerable. Users should migrate to another package if one is available or wait for the existing packages to be marked stable by their architecture maintainers. ------------------------------------------------------------------- 14 affected packages Description =========== Multiple vulnerabilities have been discovered in Mozilla Firefox, Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner. Please review the CVE identifiers referenced below for details. Impact ====== A remote attacker could entice a user to view a specially crafted web page or email, possibly resulting in execution of arbitrary code or a Denial of Service condition. Furthermore, a remote attacker may be able to perform Man-in-the-Middle attacks, obtain sensitive information, bypass restrictions and protection mechanisms, force file downloads, conduct XML injection attacks, conduct XSS attacks, bypass the Same Origin Policy, spoof URL's for phishing attacks, trigger a vertical scroll, spoof the location bar, spoof an SSL indicator, modify the browser's font, conduct clickjacking attacks, or have other unspecified impact. A local attacker could gain escalated privileges, obtain sensitive information, or replace an arbitrary downloaded file. Workaround ========== There is no known workaround at this time. Resolution ========== All Mozilla Firefox users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=www-client/firefox-10.0.11" All users of the Mozilla Firefox binary package should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=www-client/firefox-bin-10.0.11"= All Mozilla Thunderbird users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot -v ">=mail-client/thunderbird-10.0.11" All users of the Mozilla Thunderbird binary package should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot -v ">=mail-client/thunderbird-bin-10.0.11" All Mozilla SeaMonkey users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=www-client/seamonkey-2.14-r1" All users of the Mozilla SeaMonkey binary package should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=www-client/seamonkey-bin-2.14" All NSS users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=dev-libs/nss-3.14" The "www-client/mozilla-firefox" package has been merged into the "www-client/firefox" package. To upgrade, please unmerge "www-client/mozilla-firefox" and then emerge the latest "www-client/firefox" package: # emerge --sync # emerge --unmerge "www-client/mozilla-firefox" # emerge --ask --oneshot --verbose ">=www-client/firefox-10.0.11" The "www-client/mozilla-firefox-bin" package has been merged into the "www-client/firefox-bin" package. To upgrade, please unmerge "www-client/mozilla-firefox-bin" and then emerge the latest "www-client/firefox-bin" package: # emerge --sync # emerge --unmerge "www-client/mozilla-firefox-bin" # emerge --ask --oneshot --verbose ">=www-client/firefox-bin-10.0.11"= The "mail-client/mozilla-thunderbird" package has been merged into the "mail-client/thunderbird" package. To upgrade, please unmerge "mail-client/mozilla-thunderbird" and then emerge the latest "mail-client/thunderbird" package: # emerge --sync # emerge --unmerge "mail-client/mozilla-thunderbird" # emerge --ask --oneshot -v ">=mail-client/thunderbird-10.0.11" The "mail-client/mozilla-thunderbird-bin" package has been merged into the "mail-client/thunderbird-bin" package. To upgrade, please unmerge "mail-client/mozilla-thunderbird-bin" and then emerge the latest "mail-client/thunderbird-bin" package: # emerge --sync # emerge --unmerge "mail-client/mozilla-thunderbird-bin" # emerge --ask --oneshot -v ">=mail-client/thunderbird-bin-10.0.11" Gentoo discontinued support for GNU IceCat. We recommend that users unmerge GNU IceCat: # emerge --unmerge "www-client/icecat" Gentoo discontinued support for XULRunner. We recommend that users unmerge XULRunner: # emerge --unmerge "net-libs/xulrunner" Gentoo discontinued support for the XULRunner binary package. We recommend that users unmerge XULRunner: # emerge --unmerge "net-libs/xulrunner-bin" References ========== [ 1 ] CVE-2011-3101 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3101 [ 2 ] CVE-2007-2436 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-2436 [ 3 ] CVE-2007-2437 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-2437 [ 4 ] CVE-2007-2671 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-2671 [ 5 ] CVE-2007-3073 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-3073 [ 6 ] CVE-2008-0016 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-0016 [ 7 ] CVE-2008-0017 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-0017 [ 8 ] CVE-2008-0367 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-0367 [ 9 ] CVE-2008-3835 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-3835 [ 10 ] CVE-2008-3836 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-3836 [ 11 ] CVE-2008-3837 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-3837 [ 12 ] CVE-2008-4058 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4058 [ 13 ] CVE-2008-4059 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4059 [ 14 ] CVE-2008-4060 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4060 [ 15 ] CVE-2008-4061 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4061 [ 16 ] CVE-2008-4062 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4062 [ 17 ] CVE-2008-4063 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4063 [ 18 ] CVE-2008-4064 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4064 [ 19 ] CVE-2008-4065 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4065 [ 20 ] CVE-2008-4066 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4066 [ 21 ] CVE-2008-4067 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4067 [ 22 ] CVE-2008-4068 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4068 [ 23 ] CVE-2008-4069 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4069 [ 24 ] CVE-2008-4070 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4070 [ 25 ] CVE-2008-4582 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4582 [ 26 ] CVE-2008-5012 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5012 [ 27 ] CVE-2008-5013 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5013 [ 28 ] CVE-2008-5014 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5014 [ 29 ] CVE-2008-5015 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5015 [ 30 ] CVE-2008-5016 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5016 [ 31 ] CVE-2008-5017 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5017 [ 32 ] CVE-2008-5018 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5018 [ 33 ] CVE-2008-5019 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5019 [ 34 ] CVE-2008-5021 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5021 [ 35 ] CVE-2008-5022 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5022 [ 36 ] CVE-2008-5023 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5023 [ 37 ] CVE-2008-5024 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5024 [ 38 ] CVE-2008-5052 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5052 [ 39 ] CVE-2008-5500 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5500 [ 40 ] CVE-2008-5501 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5501 [ 41 ] CVE-2008-5502 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5502 [ 42 ] CVE-2008-5503 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5503 [ 43 ] CVE-2008-5504 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5504 [ 44 ] CVE-2008-5505 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5505 [ 45 ] CVE-2008-5506 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5506 [ 46 ] CVE-2008-5507 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5507 [ 47 ] CVE-2008-5508 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5508 [ 48 ] CVE-2008-5510 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5510 [ 49 ] CVE-2008-5511 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5511 [ 50 ] CVE-2008-5512 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5512 [ 51 ] CVE-2008-5513 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5513 [ 52 ] CVE-2008-5822 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5822 [ 53 ] CVE-2008-5913 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5913 [ 54 ] CVE-2008-6961 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-6961 [ 55 ] CVE-2009-0071 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0071 [ 56 ] CVE-2009-0071 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0071 [ 57 ] CVE-2009-0352 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0352 [ 58 ] CVE-2009-0353 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0353 [ 59 ] CVE-2009-0354 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0354 [ 60 ] CVE-2009-0355 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0355 [ 61 ] CVE-2009-0356 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0356 [ 62 ] CVE-2009-0357 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0357 [ 63 ] CVE-2009-0358 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0358 [ 64 ] CVE-2009-0652 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0652 [ 65 ] CVE-2009-0771 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0771 [ 66 ] CVE-2009-0772 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0772 [ 67 ] CVE-2009-0773 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0773 [ 68 ] CVE-2009-0774 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0774 [ 69 ] CVE-2009-0775 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0775 [ 70 ] CVE-2009-0776 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0776 [ 71 ] CVE-2009-0777 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0777 [ 72 ] CVE-2009-1044 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1044 [ 73 ] CVE-2009-1169 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1169 [ 74 ] CVE-2009-1302 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1302 [ 75 ] CVE-2009-1303 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1303 [ 76 ] CVE-2009-1304 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1304 [ 77 ] CVE-2009-1305 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1305 [ 78 ] CVE-2009-1306 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1306 [ 79 ] CVE-2009-1307 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1307 [ 80 ] CVE-2009-1308 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1308 [ 81 ] CVE-2009-1309 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1309 [ 82 ] CVE-2009-1310 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1310 [ 83 ] CVE-2009-1311 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1311 [ 84 ] CVE-2009-1312 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1312 [ 85 ] CVE-2009-1313 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1313 [ 86 ] CVE-2009-1392 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1392 [ 87 ] CVE-2009-1563 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1563 [ 88 ] CVE-2009-1571 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1571 [ 89 ] CVE-2009-1828 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1828 [ 90 ] CVE-2009-1832 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1832 [ 91 ] CVE-2009-1833 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1833 [ 92 ] CVE-2009-1834 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1834 [ 93 ] CVE-2009-1835 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1835 [ 94 ] CVE-2009-1836 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1836 [ 95 ] CVE-2009-1837 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1837 [ 96 ] CVE-2009-1838 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1838 [ 97 ] CVE-2009-1839 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1839 [ 98 ] CVE-2009-1840 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1840 [ 99 ] CVE-2009-1841 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-1841 [ 100 ] CVE-2009-2043 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2043 [ 101 ] CVE-2009-2044 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2044 [ 102 ] CVE-2009-2061 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2061 [ 103 ] CVE-2009-2065 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2065 [ 104 ] CVE-2009-2210 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2210 [ 105 ] CVE-2009-2404 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2404 [ 106 ] CVE-2009-2408 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2408 [ 107 ] CVE-2009-2462 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2462 [ 108 ] CVE-2009-2463 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2463 [ 109 ] CVE-2009-2464 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2464 [ 110 ] CVE-2009-2465 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2465 [ 111 ] CVE-2009-2466 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2466 [ 112 ] CVE-2009-2467 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2467 [ 113 ] CVE-2009-2469 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2469 [ 114 ] CVE-2009-2470 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2470 [ 115 ] CVE-2009-2471 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2471 [ 116 ] CVE-2009-2472 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2472 [ 117 ] CVE-2009-2477 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2477 [ 118 ] CVE-2009-2478 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2478 [ 119 ] CVE-2009-2479 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2479 [ 120 ] CVE-2009-2535 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2535 [ 121 ] CVE-2009-2654 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2654 [ 122 ] CVE-2009-2662 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2662 [ 123 ] CVE-2009-2664 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2664 [ 124 ] CVE-2009-2665 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2665 [ 125 ] CVE-2009-3069 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3069 [ 126 ] CVE-2009-3070 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3070 [ 127 ] CVE-2009-3071 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3071 [ 128 ] CVE-2009-3072 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3072 [ 129 ] CVE-2009-3074 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3074 [ 130 ] CVE-2009-3075 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3075 [ 131 ] CVE-2009-3076 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3076 [ 132 ] CVE-2009-3077 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3077 [ 133 ] CVE-2009-3078 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3078 [ 134 ] CVE-2009-3079 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3079 [ 135 ] CVE-2009-3274 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3274 [ 136 ] CVE-2009-3371 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3371 [ 137 ] CVE-2009-3372 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3372 [ 138 ] CVE-2009-3373 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3373 [ 139 ] CVE-2009-3374 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3374 [ 140 ] CVE-2009-3375 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3375 [ 141 ] CVE-2009-3376 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3376 [ 142 ] CVE-2009-3377 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3377 [ 143 ] CVE-2009-3378 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3378 [ 144 ] CVE-2009-3379 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3379 [ 145 ] CVE-2009-3380 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3380 [ 146 ] CVE-2009-3381 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3381 [ 147 ] CVE-2009-3382 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3382 [ 148 ] CVE-2009-3383 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3383 [ 149 ] CVE-2009-3388 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3388 [ 150 ] CVE-2009-3389 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3389 [ 151 ] CVE-2009-3555 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3555 [ 152 ] CVE-2009-3978 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3978 [ 153 ] CVE-2009-3979 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3979 [ 154 ] CVE-2009-3980 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3980 [ 155 ] CVE-2009-3981 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3981 [ 156 ] CVE-2009-3982 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3982 [ 157 ] CVE-2009-3983 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3983 [ 158 ] CVE-2009-3984 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3984 [ 159 ] CVE-2009-3985 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3985 [ 160 ] CVE-2009-3986 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3986 [ 161 ] CVE-2009-3987 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3987 [ 162 ] CVE-2009-3988 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3988 [ 163 ] CVE-2010-0159 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0159 [ 164 ] CVE-2010-0160 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0160 [ 165 ] CVE-2010-0162 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0162 [ 166 ] CVE-2010-0163 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0163 [ 167 ] CVE-2010-0164 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0164 [ 168 ] CVE-2010-0165 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0165 [ 169 ] CVE-2010-0166 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0166 [ 170 ] CVE-2010-0167 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0167 [ 171 ] CVE-2010-0167 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0167 [ 172 ] CVE-2010-0168 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0168 [ 173 ] CVE-2010-0169 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0169 [ 174 ] CVE-2010-0169 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0169 [ 175 ] CVE-2010-0170 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0170 [ 176 ] CVE-2010-0171 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0171 [ 177 ] CVE-2010-0171 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0171 [ 178 ] CVE-2010-0172 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0172 [ 179 ] CVE-2010-0173 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0173 [ 180 ] CVE-2010-0174 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0174 [ 181 ] CVE-2010-0174 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0174 [ 182 ] CVE-2010-0175 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0175 [ 183 ] CVE-2010-0175 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0175 [ 184 ] CVE-2010-0176 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0176 [ 185 ] CVE-2010-0176 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0176 [ 186 ] CVE-2010-0177 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0177 [ 187 ] CVE-2010-0178 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0178 [ 188 ] CVE-2010-0179 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0179 [ 189 ] CVE-2010-0181 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0181 [ 190 ] CVE-2010-0182 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0182 [ 191 ] CVE-2010-0183 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0183 [ 192 ] CVE-2010-0220 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0220 [ 193 ] CVE-2010-0648 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0648 [ 194 ] CVE-2010-0654 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0654 [ 195 ] CVE-2010-1028 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1028 [ 196 ] CVE-2010-1121 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1121 [ 197 ] CVE-2010-1125 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1125 [ 198 ] CVE-2010-1196 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1196 [ 199 ] CVE-2010-1197 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1197 [ 200 ] CVE-2010-1198 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1198 [ 201 ] CVE-2010-1199 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1199 [ 202 ] CVE-2010-1200 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1200 [ 203 ] CVE-2010-1201 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1201 [ 204 ] CVE-2010-1202 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1202 [ 205 ] CVE-2010-1203 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1203 [ 206 ] CVE-2010-1205 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1205 [ 207 ] CVE-2010-1206 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1206 [ 208 ] CVE-2010-1207 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1207 [ 209 ] CVE-2010-1208 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1208 [ 210 ] CVE-2010-1209 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1209 [ 211 ] CVE-2010-1210 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1210 [ 212 ] CVE-2010-1211 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1211 [ 213 ] CVE-2010-1212 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1212 [ 214 ] CVE-2010-1213 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1213 [ 215 ] CVE-2010-1214 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1214 [ 216 ] CVE-2010-1215 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1215 [ 217 ] CVE-2010-1585 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1585 [ 218 ] CVE-2010-2751 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2751 [ 219 ] CVE-2010-2752 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2752 [ 220 ] CVE-2010-2753 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2753 [ 221 ] CVE-2010-2754 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2754 [ 222 ] CVE-2010-2755 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2755 [ 223 ] CVE-2010-2760 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2760 [ 224 ] CVE-2010-2762 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2762 [ 225 ] CVE-2010-2763 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2763 [ 226 ] CVE-2010-2764 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2764 [ 227 ] CVE-2010-2765 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2765 [ 228 ] CVE-2010-2766 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2766 [ 229 ] CVE-2010-2767 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2767 [ 230 ] CVE-2010-2768 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2768 [ 231 ] CVE-2010-2769 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2769 [ 232 ] CVE-2010-2770 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2770 [ 233 ] CVE-2010-3131 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3131 [ 234 ] CVE-2010-3166 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3166 [ 235 ] CVE-2010-3167 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3167 [ 236 ] CVE-2010-3168 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3168 [ 237 ] CVE-2010-3169 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3169 [ 238 ] CVE-2010-3170 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3170 [ 239 ] CVE-2010-3171 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3171 [ 240 ] CVE-2010-3173 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3173 [ 241 ] CVE-2010-3174 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3174 [ 242 ] CVE-2010-3175 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3175 [ 243 ] CVE-2010-3176 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3176 [ 244 ] CVE-2010-3177 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3177 [ 245 ] CVE-2010-3178 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3178 [ 246 ] CVE-2010-3179 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3179 [ 247 ] CVE-2010-3180 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3180 [ 248 ] CVE-2010-3182 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3182 [ 249 ] CVE-2010-3183 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3183 [ 250 ] CVE-2010-3399 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3399 [ 251 ] CVE-2010-3400 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3400 [ 252 ] CVE-2010-3765 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3765 [ 253 ] CVE-2010-3766 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3766 [ 254 ] CVE-2010-3767 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3767 [ 255 ] CVE-2010-3768 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3768 [ 256 ] CVE-2010-3769 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3769 [ 257 ] CVE-2010-3770 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3770 [ 258 ] CVE-2010-3771 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3771 [ 259 ] CVE-2010-3772 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3772 [ 260 ] CVE-2010-3773 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3773 [ 261 ] CVE-2010-3774 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3774 [ 262 ] CVE-2010-3775 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3775 [ 263 ] CVE-2010-3776 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3776 [ 264 ] CVE-2010-3777 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3777 [ 265 ] CVE-2010-3778 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3778 [ 266 ] CVE-2010-4508 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4508 [ 267 ] CVE-2010-5074 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-5074 [ 268 ] CVE-2011-0051 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0051 [ 269 ] CVE-2011-0053 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0053 [ 270 ] CVE-2011-0054 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0054 [ 271 ] CVE-2011-0055 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0055 [ 272 ] CVE-2011-0056 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0056 [ 273 ] CVE-2011-0057 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0057 [ 274 ] CVE-2011-0058 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0058 [ 275 ] CVE-2011-0059 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0059 [ 276 ] CVE-2011-0061 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0061 [ 277 ] CVE-2011-0062 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0062 [ 278 ] CVE-2011-0065 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0065 [ 279 ] CVE-2011-0066 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0066 [ 280 ] CVE-2011-0067 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0067 [ 281 ] CVE-2011-0068 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0068 [ 282 ] CVE-2011-0069 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0069 [ 283 ] CVE-2011-0070 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0070 [ 284 ] CVE-2011-0071 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0071 [ 285 ] CVE-2011-0072 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0072 [ 286 ] CVE-2011-0073 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0073 [ 287 ] CVE-2011-0074 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0074 [ 288 ] CVE-2011-0075 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0075 [ 289 ] CVE-2011-0076 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0076 [ 290 ] CVE-2011-0077 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0077 [ 291 ] CVE-2011-0078 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0078 [ 292 ] CVE-2011-0079 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0079 [ 293 ] CVE-2011-0080 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0080 [ 294 ] CVE-2011-0081 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0081 [ 295 ] CVE-2011-0082 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0082 [ 296 ] CVE-2011-0083 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0083 [ 297 ] CVE-2011-0084 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0084 [ 298 ] CVE-2011-0085 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0085 [ 299 ] CVE-2011-1187 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1187 [ 300 ] CVE-2011-1202 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1202 [ 301 ] CVE-2011-1712 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1712 [ 302 ] CVE-2011-2362 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2362 [ 303 ] CVE-2011-2363 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2363 [ 304 ] CVE-2011-2364 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2364 [ 305 ] CVE-2011-2365 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2365 [ 306 ] CVE-2011-2369 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2369 [ 307 ] CVE-2011-2370 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2370 [ 308 ] CVE-2011-2371 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2371 [ 309 ] CVE-2011-2372 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2372 [ 310 ] CVE-2011-2373 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2373 [ 311 ] CVE-2011-2374 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2374 [ 312 ] CVE-2011-2375 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2375 [ 313 ] CVE-2011-2376 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2376 [ 314 ] CVE-2011-2377 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2377 [ 315 ] CVE-2011-2378 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2378 [ 316 ] CVE-2011-2605 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2605 [ 317 ] CVE-2011-2980 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2980 [ 318 ] CVE-2011-2981 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2981 [ 319 ] CVE-2011-2982 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2982 [ 320 ] CVE-2011-2983 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2983 [ 321 ] CVE-2011-2984 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2984 [ 322 ] CVE-2011-2985 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2985 [ 323 ] CVE-2011-2986 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2986 [ 324 ] CVE-2011-2987 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2987 [ 325 ] CVE-2011-2988 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2988 [ 326 ] CVE-2011-2989 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2989 [ 327 ] CVE-2011-2990 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2990 [ 328 ] CVE-2011-2991 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2991 [ 329 ] CVE-2011-2993 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2993 [ 330 ] CVE-2011-2995 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2995 [ 331 ] CVE-2011-2996 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2996 [ 332 ] CVE-2011-2997 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2997 [ 333 ] CVE-2011-2998 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2998 [ 334 ] CVE-2011-2999 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2999 [ 335 ] CVE-2011-3000 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3000 [ 336 ] CVE-2011-3001 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3001 [ 337 ] CVE-2011-3002 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3002 [ 338 ] CVE-2011-3003 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3003 [ 339 ] CVE-2011-3004 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3004 [ 340 ] CVE-2011-3005 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3005 [ 341 ] CVE-2011-3026 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3026 [ 342 ] CVE-2011-3062 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3062 [ 343 ] CVE-2011-3232 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3232 [ 344 ] CVE-2011-3389 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3389 [ 345 ] CVE-2011-3640 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3640 [ 346 ] CVE-2011-3647 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3647 [ 347 ] CVE-2011-3648 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3648 [ 348 ] CVE-2011-3649 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3649 [ 349 ] CVE-2011-3650 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3650 [ 350 ] CVE-2011-3651 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3651 [ 351 ] CVE-2011-3652 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3652 [ 352 ] CVE-2011-3653 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3653 [ 353 ] CVE-2011-3654 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3654 [ 354 ] CVE-2011-3655 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3655 [ 355 ] CVE-2011-3658 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3658 [ 356 ] CVE-2011-3659 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3659 [ 357 ] CVE-2011-3660 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3660 [ 358 ] CVE-2011-3661 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3661 [ 359 ] CVE-2011-3663 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3663 [ 360 ] CVE-2011-3665 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3665 [ 361 ] CVE-2011-3670 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3670 [ 362 ] CVE-2011-3866 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3866 [ 363 ] CVE-2011-4688 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4688 [ 364 ] CVE-2012-0441 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0441 [ 365 ] CVE-2012-0442 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0442 [ 366 ] CVE-2012-0443 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0443 [ 367 ] CVE-2012-0444 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0444 [ 368 ] CVE-2012-0445 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0445 [ 369 ] CVE-2012-0446 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0446 [ 370 ] CVE-2012-0447 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0447 [ 371 ] CVE-2012-0449 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0449 [ 372 ] CVE-2012-0450 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0450 [ 373 ] CVE-2012-0451 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0451 [ 374 ] CVE-2012-0452 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0452 [ 375 ] CVE-2012-0455 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0455 [ 376 ] CVE-2012-0456 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0456 [ 377 ] CVE-2012-0457 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0457 [ 378 ] CVE-2012-0458 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0458 [ 379 ] CVE-2012-0459 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0459 [ 380 ] CVE-2012-0460 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0460 [ 381 ] CVE-2012-0461 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0461 [ 382 ] CVE-2012-0462 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0462 [ 383 ] CVE-2012-0463 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0463 [ 384 ] CVE-2012-0464 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0464 [ 385 ] CVE-2012-0467 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0467 [ 386 ] CVE-2012-0468 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0468 [ 387 ] CVE-2012-0469 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0469 [ 388 ] CVE-2012-0470 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0470 [ 389 ] CVE-2012-0471 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0471 [ 390 ] CVE-2012-0473 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0473 [ 391 ] CVE-2012-0474 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0474 [ 392 ] CVE-2012-0475 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0475 [ 393 ] CVE-2012-0477 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0477 [ 394 ] CVE-2012-0478 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0478 [ 395 ] CVE-2012-0479 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0479 [ 396 ] CVE-2012-1937 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1937 [ 397 ] CVE-2012-1938 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1938 [ 398 ] CVE-2012-1939 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1939 [ 399 ] CVE-2012-1940 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1940 [ 400 ] CVE-2012-1941 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1941 [ 401 ] CVE-2012-1945 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1945 [ 402 ] CVE-2012-1946 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1946 [ 403 ] CVE-2012-1947 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1947 [ 404 ] CVE-2012-1948 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1948 [ 405 ] CVE-2012-1949 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1949 [ 406 ] CVE-2012-1950 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1950 [ 407 ] CVE-2012-1951 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1951 [ 408 ] CVE-2012-1952 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1952 [ 409 ] CVE-2012-1953 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1953 [ 410 ] CVE-2012-1954 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1954 [ 411 ] CVE-2012-1955 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1955 [ 412 ] CVE-2012-1956 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1956 [ 413 ] CVE-2012-1957 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1957 [ 414 ] CVE-2012-1958 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1958 [ 415 ] CVE-2012-1959 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1959 [ 416 ] CVE-2012-1960 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1960 [ 417 ] CVE-2012-1961 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1961 [ 418 ] CVE-2012-1962 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1962 [ 419 ] CVE-2012-1963 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1963 [ 420 ] CVE-2012-1964 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1964 [ 421 ] CVE-2012-1965 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1965 [ 422 ] CVE-2012-1966 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1966 [ 423 ] CVE-2012-1967 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1967 [ 424 ] CVE-2012-1970 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1970 [ 425 ] CVE-2012-1971 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1971 [ 426 ] CVE-2012-1972 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1972 [ 427 ] CVE-2012-1973 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1973 [ 428 ] CVE-2012-1974 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1974 [ 429 ] CVE-2012-1975 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1975 [ 430 ] CVE-2012-1976 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1976 [ 431 ] CVE-2012-1994 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1994 [ 432 ] CVE-2012-3956 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3956 [ 433 ] CVE-2012-3957 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3957 [ 434 ] CVE-2012-3958 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3958 [ 435 ] CVE-2012-3959 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3959 [ 436 ] CVE-2012-3960 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3960 [ 437 ] CVE-2012-3961 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3961 [ 438 ] CVE-2012-3962 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3962 [ 439 ] CVE-2012-3963 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3963 [ 440 ] CVE-2012-3964 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3964 [ 441 ] CVE-2012-3965 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3965 [ 442 ] CVE-2012-3966 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3966 [ 443 ] CVE-2012-3967 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3967 [ 444 ] CVE-2012-3968 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3968 [ 445 ] CVE-2012-3969 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3969 [ 446 ] CVE-2012-3970 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3970 [ 447 ] CVE-2012-3971 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3971 [ 448 ] CVE-2012-3972 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3972 [ 449 ] CVE-2012-3973 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3973 [ 450 ] CVE-2012-3975 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3975 [ 451 ] CVE-2012-3976 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3976 [ 452 ] CVE-2012-3977 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3977 [ 453 ] CVE-2012-3978 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3978 [ 454 ] CVE-2012-3980 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3980 [ 455 ] CVE-2012-3982 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3982 [ 456 ] CVE-2012-3984 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3984 [ 457 ] CVE-2012-3985 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3985 [ 458 ] CVE-2012-3986 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3986 [ 459 ] CVE-2012-3988 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3988 [ 460 ] CVE-2012-3989 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3989 [ 461 ] CVE-2012-3990 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3990 [ 462 ] CVE-2012-3991 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3991 [ 463 ] CVE-2012-3992 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3992 [ 464 ] CVE-2012-3993 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3993 [ 465 ] CVE-2012-3994 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3994 [ 466 ] CVE-2012-3995 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3995 [ 467 ] CVE-2012-4179 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4179 [ 468 ] CVE-2012-4180 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4180 [ 469 ] CVE-2012-4181 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4181 [ 470 ] CVE-2012-4182 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4182 [ 471 ] CVE-2012-4183 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4183 [ 472 ] CVE-2012-4184 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4184 [ 473 ] CVE-2012-4185 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4185 [ 474 ] CVE-2012-4186 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4186 [ 475 ] CVE-2012-4187 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4187 [ 476 ] CVE-2012-4188 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4188 [ 477 ] CVE-2012-4190 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4190 [ 478 ] CVE-2012-4191 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4191 [ 479 ] CVE-2012-4192 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4192 [ 480 ] CVE-2012-4193 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4193 [ 481 ] CVE-2012-4194 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4194 [ 482 ] CVE-2012-4195 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4195 [ 483 ] CVE-2012-4196 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4196 [ 484 ] CVE-2012-4201 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4201 [ 485 ] CVE-2012-4202 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4202 [ 486 ] CVE-2012-4204 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4204 [ 487 ] CVE-2012-4205 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4205 [ 488 ] CVE-2012-4206 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4206 [ 489 ] CVE-2012-4207 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4207 [ 490 ] CVE-2012-4208 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4208 [ 491 ] CVE-2012-4209 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4209 [ 492 ] CVE-2012-4210 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4210 [ 493 ] CVE-2012-4212 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4212 [ 494 ] CVE-2012-4215 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4215 [ 495 ] CVE-2012-4216 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4216 [ 496 ] CVE-2012-5354 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5354 [ 497 ] CVE-2012-5829 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5829 [ 498 ] CVE-2012-5830 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5830 [ 499 ] CVE-2012-5833 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5833 [ 500 ] CVE-2012-5835 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5835 [ 501 ] CVE-2012-5836 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5836 [ 502 ] CVE-2012-5838 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5838 [ 503 ] CVE-2012-5839 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5839 [ 504 ] CVE-2012-5840 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5840 [ 505 ] CVE-2012-5841 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5841 [ 506 ] CVE-2012-5842 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5842 [ 507 ] CVE-2012-5843 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5843 [ 508 ] Firefox Blocking Fraudulent Certificates http://blog.mozilla.org/security/2011/03/22/firefox-blocking-fraudulent-c= ertificates/ [ 509 ] Mozilla Foundation Security Advisory 2011-11 http://www.mozilla.org/security/announce/2011/mfsa2011-11.html [ 510 ] Mozilla Foundation Security Advisory 2011-34 http://www.mozilla.org/security/announce/2011/mfsa2011-34.html Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-201301-01.xml Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2013 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5 . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c03266681 Version: 1 HPSBUX02760 SSRT100805 rev.1 - HP-UX Running Java, Remote Unauthorized Access, Disclosure of Information, and Other Vulnerabilities NOTICE: The information in this Security Bulletin should be acted upon as soon as possible. Release Date: 2012-04-02 Last Updated: 2012-04-02 ------------------------------------------------------------------------------ Potential Security Impact: Remote unauthorized access, disclosure of information, and other vulnerabilities Source: Hewlett-Packard Company, HP Software Security Response Team VULNERABILITY SUMMARY Potential security vulnerabilities have been identified in Java Runtime Environment (JRE) and Java Developer Kit (JDK) running on HP-UX. These vulnerabilities could allow remote unauthorized access, disclosure of information, and other vulnerabilities. References: CVE-2011-3389, CVE-2011-3521, CVE-2011-3545, CVE-2011-3547, CVE-2011-3548, CVE-2011-3549, CVE-2011-3552, CVE-2011-3554, CVE-2011-3556, CVE-2011-3557, CVE-2011-3560, CVE-2011-3563, CVE-2012-0498, CVE-2012-0499, CVE-2012-0501 CVE-2012-0502, CVE-2012-0503, CVE-2012-0505, CVE-2012-0506, CVE-2012-0507. SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. HP-UX B.11.11, B.11.23, B.11.31 running HP JDK and JRE 5.0.24 or earlier BACKGROUND CVSS 2.0 Base Metrics =========================================================== Reference Base Vector Base Score CVE-2011-3389 (AV:N/AC:M/Au:N/C:P/I:N/A:N) 4.3 CVE-2011-3521 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2011-3545 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2011-3547 (AV:N/AC:L/Au:N/C:P/I:N/A:N) 5.0 CVE-2011-3548 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2011-3549 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2011-3552 (AV:N/AC:H/Au:N/C:N/I:P/A:N) 2.6 CVE-2011-3554 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2011-3556 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5 CVE-2011-3557 (AV:N/AC:M/Au:N/C:P/I:P/A:P) 6.8 CVE-2011-3560 (AV:N/AC:L/Au:N/C:P/I:P/A:N) 6.4 CVE-2011-3563 (AV:N/AC:L/Au:N/C:P/I:N/A:P) 6.4 CVE-2012-0498 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2012-0499 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2012-0501 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0 CVE-2012-0502 (AV:N/AC:L/Au:N/C:P/I:N/A:P) 6.4 CVE-2012-0503 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5 CVE-2012-0505 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5 CVE-2012-0506 (AV:N/AC:M/Au:N/C:N/I:P/A:N) 4.3 CVE-2012-0507 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002 RESOLUTION HP has provided the following Java version upgrades to resolve these vulnerabilities. The upgrades are available from the following location http://www.hp.com/go/java HP-UX B.11.11, B.11.23, B.11.31 JDK and JRE v5.0.25 or subsequent MANUAL ACTIONS: Yes - Update For Java v5.0.24 and earlier, update to Java v5.0.25 or subsequent PRODUCT SPECIFIC INFORMATION HP-UX Software Assistant: HP-UX Software Assistant is an enhanced application that replaces HP-UX Security Patch Check. It analyzes all Security Bulletins issued by HP and lists recommended actions that may apply to a specific HP-UX system. It can also download patches and create a depot automatically. For more information see https://www.hp.com/go/swa The following text is for use by the HP-UX Software Assistant. AFFECTED VERSIONS HP-UX B.11.11 HP-UX B.11.23 HP-UX B.11.31 =========== Jdk15.JDK15 Jdk15.JDK15-COM Jdk15.JDK15-DEMO Jdk15.JDK15-IPF32 Jdk15.JDK15-IPF64 Jdk15.JDK15-COM Jdk15.JDK15-DEMO Jdk15.JDK15-PA20 Jdk15.JDK15-PA20W Jre15.JRE15 Jre15.JRE15-COM Jre15.JRE15-IPF32 Jre15.JRE15-IPF32-HS Jre15.JRE15-IPF64 Jre15.JRE15-IPF64-HS Jre15.JRE15-PA20 Jre15.JRE15-PA20-HS Jre15.JRE15-PA20W Jre15.JRE15-PA20W-HS action: install revision 1.5.0.25.00 or subsequent END AFFECTED VERSIONS HISTORY Version:1 (rev.1) 2 April 2012 Initial release Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com. Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins Security Bulletin List: A list of HP Security Bulletins, updated periodically, is contained in HP Security Notice HPSN-2011-001: https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c02964430 Security Bulletin Archive: A list of recently released Security Bulletins is available here: http://h20566.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/ Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB. 3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX Copyright 2012 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits;damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux) iEYEARECAAYFAk991IcACgkQ4B86/C0qfVmTQACdH6cq0rfvRaaml5i0JIdcbxVp veQAoIZt9Vw8lADDGV9cz/4dVT3DZPR8 =dKdg -----END PGP SIGNATURE----- . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Advisory MDVSA-2012:058 http://www.mandriva.com/security/ _______________________________________________________________________ Package : curl Date : April 13, 2012 Affected: 2010.1, 2011. _______________________________________________________________________ Problem Description: Multiple vulnerabilities has been found and corrected in curl: curl is vulnerable to a SSL CBC IV vulnerability when built to use OpenSSL for the SSL/TLS layer. A work-around has been added to mitigate the problem (CVE-2011-3389). curl is vulnerable to a data injection attack for certain protocols through control characters embedded or percent-encoded in URLs (CVE-2012-0036). The updated packages have been patched to correct these issues. _______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0036 http://curl.haxx.se/docs/adv_20120124B.html http://thread.gmane.org/gmane.comp.web.curl.library/34659 http://curl.haxx.se/libcurl/c/curl_easy_setopt.html#CURLOPTSSLOPTIONS http://curl.haxx.se/docs/manpage.html#--ssl-allow-beast http://curl.haxx.se/docs/adv_20120124.html _______________________________________________________________________ Updated Packages: Mandriva Linux 2010.1: 2bdc2242df0233c3e0b3b259d772decc 2010.1/i586/curl-7.20.1-2.2mdv2010.2.i586.rpm 514a3c248b06b1003ca879a2f6836fd6 2010.1/i586/curl-examples-7.20.1-2.2mdv2010.2.i586.rpm 94af6abc58dc950e22d109f054ec970b 2010.1/i586/libcurl4-7.20.1-2.2mdv2010.2.i586.rpm 12d9e5f39c9617da8a0e795820e7b4d5 2010.1/i586/libcurl-devel-7.20.1-2.2mdv2010.2.i586.rpm 4a4a0081446bd7b7ea0ca5c2597af8d4 2010.1/SRPMS/curl-7.20.1-2.2mdv2010.2.src.rpm Mandriva Linux 2010.1/X86_64: 0319e4b64c85f421fd234aa60e795e0a 2010.1/x86_64/curl-7.20.1-2.2mdv2010.2.x86_64.rpm e27cc075785a8920d1ef3e3cd7550b63 2010.1/x86_64/curl-examples-7.20.1-2.2mdv2010.2.x86_64.rpm 6bc1a150e02f3d6315e2a69c106aedd8 2010.1/x86_64/lib64curl4-7.20.1-2.2mdv2010.2.x86_64.rpm 834d8fa9140bbc8e157f897a4dda3567 2010.1/x86_64/lib64curl-devel-7.20.1-2.2mdv2010.2.x86_64.rpm 4a4a0081446bd7b7ea0ca5c2597af8d4 2010.1/SRPMS/curl-7.20.1-2.2mdv2010.2.src.rpm Mandriva Linux 2011: 6445b9b47ca90ff11912a6793a2f4fb9 2011/i586/curl-7.21.7-1.1-mdv2011.0.i586.rpm d0b92983656b8629903f9bf2bbfbc43b 2011/i586/curl-examples-7.21.7-1.1-mdv2011.0.i586.rpm 2bc028afacef4e47af3597d71b594fd7 2011/i586/libcurl4-7.21.7-1.1-mdv2011.0.i586.rpm 28dc517658b4b5e0d9e2204da6b2d603 2011/i586/libcurl-devel-7.21.7-1.1-mdv2011.0.i586.rpm 2194276240c12c866c31fba743ea9ee4 2011/SRPMS/curl-7.21.7-1.1.src.rpm Mandriva Linux 2011/X86_64: 8566de165a109b88c211731f84d5279a 2011/x86_64/curl-7.21.7-1.1-mdv2011.0.x86_64.rpm 1a9dcb47bb78ebcff2c2242be198c59f 2011/x86_64/curl-examples-7.21.7-1.1-mdv2011.0.x86_64.rpm 9b75a29092361b8f7c9d6ffebb6cec48 2011/x86_64/lib64curl4-7.21.7-1.1-mdv2011.0.x86_64.rpm 82b79d8ba65b018eb34d35ad3a1cb643 2011/x86_64/lib64curl-devel-7.21.7-1.1-mdv2011.0.x86_64.rpm 2194276240c12c866c31fba743ea9ee4 2011/SRPMS/curl-7.21.7-1.1.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security

Trust: 2.52

sources: NVD: CVE-2011-3389 // CERT/CC: VU#864643 // BID: 49778 // VULMON: CVE-2011-3389 // PACKETSTORM: 106747 // PACKETSTORM: 127267 // PACKETSTORM: 115046 // PACKETSTORM: 119293 // PACKETSTORM: 111633 // PACKETSTORM: 111851

AFFECTED PRODUCTS

vendor:hitachimodel:web serverscope:eqversion:02-03

Trust: 1.8

vendor:hitachimodel:web server 02-04-/ascope: - version: -

Trust: 1.5

vendor:hitachimodel:web serverscope:eqversion:02-01

Trust: 1.2

vendor:hitachimodel:web serverscope:eqversion:02-02

Trust: 1.2

vendor:siemensmodel:simatic rf68xrscope:ltversion:3.2.1

Trust: 1.0

vendor:haxxmodel:curlscope:gteversion:7.10.6

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:6.0

Trust: 1.0

vendor:redhatmodel:enterprise linux workstationscope:eqversion:5.0

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:10.04

Trust: 1.0

vendor:microsoftmodel:internet explorerscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic rf615rscope:ltversion:3.2.1

Trust: 1.0

vendor:mozillamodel:firefoxscope:eqversion: -

Trust: 1.0

vendor:microsoftmodel:windowsscope:eqversion: -

Trust: 1.0

vendor:haxxmodel:curlscope:lteversion:7.23.1

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:6.2

Trust: 1.0

vendor:redhatmodel:enterprise linux workstationscope:eqversion:6.0

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:11.10

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:10.10

Trust: 1.0

vendor:redhatmodel:enterprise linux serverscope:eqversion:5.0

Trust: 1.0

vendor:redhatmodel:enterprise linux desktopscope:eqversion:5.0

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:11.04

Trust: 1.0

vendor:redhatmodel:enterprise linux eusscope:eqversion:6.2

Trust: 1.0

vendor:redhatmodel:enterprise linux serverscope:eqversion:6.0

Trust: 1.0

vendor:redhatmodel:enterprise linux desktopscope:eqversion:6.0

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:5.0

Trust: 1.0

vendor:operamodel:browserscope:eqversion: -

Trust: 1.0

vendor:googlemodel:chromescope:eqversion: -

Trust: 1.0

vendor:sunmodel:jre 17scope:eqversion:1.6

Trust: 0.9

vendor:sunmodel:sdk 08scope:eqversion:1.4.2

Trust: 0.9

vendor:hitachimodel:web server 01-02-/bscope: - version: -

Trust: 0.9

vendor:hitachimodel:ucosminexus developerscope:eqversion:09-50

Trust: 0.9

vendor:sunmodel:jre 1.4.2 30scope: - version: -

Trust: 0.9

vendor:sunmodel:jdk 1.5.0 16scope: - version: -

Trust: 0.9

vendor:sunmodel:jdk 05scope:eqversion:1.6

Trust: 0.9

vendor:sunmodel:sdk 10scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jdk 14scope:eqversion:1.6

Trust: 0.9

vendor:sunmodel:jrescope:eqversion:1.5

Trust: 0.9

vendor:sunmodel:sdk 1.4.2 25scope: - version: -

Trust: 0.9

vendor:hitachimodel:ucosminexus clientscope:eqversion:09-00

Trust: 0.9

vendor:sunmodel:jre 1.4.2 25scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 06scope:eqversion:1.5

Trust: 0.9

vendor:sunmodel:jre 01scope:eqversion:1.4.1

Trust: 0.9

vendor:sunmodel:jre 05scope:eqversion:1.5

Trust: 0.9

vendor:sunmodel:jdk 1.6.0 03scope: - version: -

Trust: 0.9

vendor:sunmodel:sdk 1.4.2 11scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 10scope:eqversion:1.6

Trust: 0.9

vendor:hitachimodel:ucosminexus application server-rscope:eqversion:09-50

Trust: 0.9

vendor:sunmodel:sdk 03scope:eqversion:1.4.1

Trust: 0.9

vendor:sunmodel:jre 01scope:eqversion:1.5

Trust: 0.9

vendor:sunmodel:jre 1.5.0 11scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.4.2 12scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 09scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:sdk 24scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jre 02scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jre 07scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jre 1.4.2 22scope: - version: -

Trust: 0.9

vendor:sunmodel:jrescope:eqversion:1.6

Trust: 0.9

vendor:oraclemodel:jre 1.6.0 23scope: - version: -

Trust: 0.9

vendor:sunmodel:sdk 1.4.2 27scope: - version: -

Trust: 0.9

vendor:sunmodel:sdk 15scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:sdk 07scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jdk 1.5.0 25scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 07scope:eqversion:1.6

Trust: 0.9

vendor:sunmodel:jdk 1.5.0 29scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 03scope:eqversion:1.4.1

Trust: 0.9

vendor:sunmodel:jre 1.6.0 11scope: - version: -

Trust: 0.9

vendor:sunmodel:sdk 02scope:eqversion:1.4.1

Trust: 0.9

vendor:sunmodel:jre 01scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jre 04scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jdkscope:eqversion:1.6

Trust: 0.9

vendor:sunmodel:jre 1.5.0 17scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.4.2 17scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 24scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jre 1.5.0 27scope: - version: -

Trust: 0.9

vendor:hitachimodel:ucosminexus clientscope:eqversion:09-50

Trust: 0.9

vendor:sunmodel:sdk 1.4.2 30scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.6.0 03scope: - version: -

Trust: 0.9

vendor:sunmodel:jdk 01scope:eqversion:1.5

Trust: 0.9

vendor:oraclemodel:jre 1.6.0 26scope: - version: -

Trust: 0.9

vendor:sunmodel:sdk 06scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jre 1.4.2 31scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 08scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jdk 10scope:eqversion:1.6

Trust: 0.9

vendor:sunmodel:jre 1.4.2 13scope: - version: -

Trust: 0.9

vendor:sunmodel:jdk 02scope:eqversion:1.5

Trust: 0.9

vendor:sunmodel:jdk 1.5.0 23scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 04scope:eqversion:1.5

Trust: 0.9

vendor:sunmodel:jre 05scope:eqversion:1.6

Trust: 0.9

vendor:sunmodel:jdk 1.5.0 26scope: - version: -

Trust: 0.9

vendor:sunmodel:jrescope:eqversion:1.7

Trust: 0.9

vendor:sunmodel:sdk 1.4.2 16scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.5.0 29scope: - version: -

Trust: 0.9

vendor:hitachimodel:ucosminexus service platformscope:eqversion:09-50

Trust: 0.9

vendor:hitachimodel:ucosminexus service architectscope:eqversion:09-00

Trust: 0.9

vendor:hitachimodel:ucosminexus service architectscope:eqversion:09-50

Trust: 0.9

vendor:sunmodel:jdk 1.5.0 31scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 16scope:eqversion:1.5

Trust: 0.9

vendor:sunmodel:jre 1.5.0 20scope: - version: -

Trust: 0.9

vendor:sunmodel:jdk 1.5.0 32scope:neversion: -

Trust: 0.9

vendor:sunmodel:jdk 1.5.0 30scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 18scope:eqversion:1.5

Trust: 0.9

vendor:sunmodel:jdk 11scope:eqversion:1.6

Trust: 0.9

vendor:sunmodel:sdk .0 03scope:eqversion:1.4

Trust: 0.9

vendor:sunmodel:jre 1.4.2 11scope: - version: -

Trust: 0.9

vendor:sunmodel:jdk 0 10scope:eqversion:1.5

Trust: 0.9

vendor:sunmodel:jre 1.5.0 10scope: - version: -

Trust: 0.9

vendor:oraclemodel:jdk 1.6.0 24scope: - version: -

Trust: 0.9

vendor:sunmodel:jdk 1.5.0 27scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 03scope:eqversion:1.5

Trust: 0.9

vendor:sunmodel:sdk 1.4.2 29scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 02scope:eqversion:1.4.1

Trust: 0.9

vendor:sunmodel:sdk 1.4.2 14scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.5.0 14scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.4.2 20scope: - version: -

Trust: 0.9

vendor:sunmodel:jdk 1.5.0 24scope: - version: -

Trust: 0.9

vendor:hitachimodel:web server 01-02-/cscope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.5.0 25scope: - version: -

Trust: 0.9

vendor:oraclemodel:jre 1.6.0 24scope: - version: -

Trust: 0.9

vendor:sunmodel:jdk .0 05scope:eqversion:1.5

Trust: 0.9

vendor:sunmodel:jre 06scope:eqversion:1.6

Trust: 0.9

vendor:sunmodel:jre 1.5.0 28scope: - version: -

Trust: 0.9

vendor:hitachimodel:ucosminexus operator for service platformscope:eqversion:09-00

Trust: 0.9

vendor:sunmodel:jdk 1.5.0 13scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.4.2 16scope: - version: -

Trust: 0.9

vendor:sunmodel:sdk 1.4.2 17scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.6.0 15scope: - version: -

Trust: 0.9

vendor:sunmodel:jrescope:eqversion:1.4.1

Trust: 0.9

vendor:sunmodel:jre 1.6.0 21scope: - version: -

Trust: 0.9

vendor:sunmodel:sdk 1.4.2 33scope: - version: -

Trust: 0.9

vendor:sunmodel:jdk 15scope:eqversion:1.5

Trust: 0.9

vendor:sunmodel:sdk 1.4.2 31scope: - version: -

Trust: 0.9

vendor:oraclemodel:jre 1.6.0 28scope:neversion: -

Trust: 0.9

vendor:sunmodel:jre 10scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jre 1.6.0 18scope: - version: -

Trust: 0.9

vendor:sunmodel:sdkscope:eqversion:1.4.1

Trust: 0.9

vendor:oraclemodel:jre 1.6.0 22scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.5.0 31scope: - version: -

Trust: 0.9

vendor:sunmodel:sdk .0 4scope:eqversion:1.4

Trust: 0.9

vendor:sunmodel:sdk 1.4.2 28scope: - version: -

Trust: 0.9

vendor:sunmodel:jdk 1.6.0 21scope: - version: -

Trust: 0.9

vendor:oraclemodel:jre 1.6.0 27scope: - version: -

Trust: 0.9

vendor:sunmodel:jdk 1.6.0 15scope: - version: -

Trust: 0.9

vendor:sunmodel:sdk .0 02scope:eqversion:1.4

Trust: 0.9

vendor:sunmodel:sdk 1.4.2 12scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.4.2 18scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.4.2 14scope: - version: -

Trust: 0.9

vendor:hitachimodel:ucosminexus application server-rscope:eqversion:09-00

Trust: 0.9

vendor:sunmodel:jre 1.6.0 02scope: - version: -

Trust: 0.9

vendor:hitachimodel:ucosminexus developerscope:eqversion:09-00

Trust: 0.9

vendor:sunmodel:jrescope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jdk 1.5.0 28scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 06scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jre 1.4.2 15scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 15scope:eqversion:1.5

Trust: 0.9

vendor:sunmodel:sdk 1.4.2 26scope: - version: -

Trust: 0.9

vendor:oraclemodel:jdk 1.6.0 28scope:neversion: -

Trust: 0.9

vendor:sunmodel:jre 1.4.2 29scope: - version: -

Trust: 0.9

vendor:sunmodel:sdk 01scope:eqversion:1.4.1

Trust: 0.9

vendor:sunmodel:jdk 17scope:eqversion:1.6

Trust: 0.9

vendor:sunmodel:sdk 09scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jre 13scope:eqversion:1.6

Trust: 0.9

vendor:sunmodel:sdkscope:eqversion:1.4.2

Trust: 0.9

vendor:hitachimodel:ucosminexus primary server basescope:eqversion:09-00

Trust: 0.9

vendor:hitachimodel:ucosminexus primary server basescope:eqversion:09-50

Trust: 0.9

vendor:sunmodel:jre 1.4.2 32scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.5.0 26scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.4.2 33scope: - version: -

Trust: 0.9

vendor:oraclemodel:jdk 1.6.0 26scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.5.0 30scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.5.0 32scope:neversion: -

Trust: 0.9

vendor:sunmodel:sdk 1.4.2 18scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 05scope:eqversion:1.4.2

Trust: 0.9

vendor:hitachimodel:ucosminexus operator for service platformscope:eqversion:09-50

Trust: 0.9

vendor:sunmodel:jdk 17scope:eqversion:1.5

Trust: 0.9

vendor:sunmodel:jdk 18scope:eqversion:1.5

Trust: 0.9

vendor:sunmodel:sdk 1.4.2 22scope: - version: -

Trust: 0.9

vendor:oraclemodel:jdkscope:eqversion:1.7

Trust: 0.9

vendor:sunmodel:jdk 1.6.0 02scope: - version: -

Trust: 0.9

vendor:sunmodel:sdk 04scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jre 1.6.0 01scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 12scope:eqversion:1.6

Trust: 0.9

vendor:sunmodel:jdk 07scope:eqversion:1.6

Trust: 0.9

vendor:sunmodel:sdk 05scope:eqversion:1.4.2

Trust: 0.9

vendor:hitachimodel:web server 01-02-/ascope: - version: -

Trust: 0.9

vendor:sunmodel:jdk 14scope:eqversion:1.5

Trust: 0.9

vendor:sunmodel:jre 02scope:eqversion:1.5

Trust: 0.9

vendor:sunmodel:sdk 03scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jre 03scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:sdk 1.4.2 19scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.5.0 12scope: - version: -

Trust: 0.9

vendor:sunmodel:sdkscope:eqversion:1.4

Trust: 0.9

vendor:sunmodel:jdk 13scope:eqversion:1.6

Trust: 0.9

vendor:sunmodel:jre 1.5.0 13scope: - version: -

Trust: 0.9

vendor:oraclemodel:jdk 1.6.0 25scope: - version: -

Trust: 0.9

vendor:sunmodel:sdk 1.4.2 32scope: - version: -

Trust: 0.9

vendor:sunmodel:jdk 22scope:eqversion:1.5

Trust: 0.9

vendor:sunmodel:jre 1.4.2 19scope: - version: -

Trust: 0.9

vendor:oraclemodel:jdk 1.6.0 23scope: - version: -

Trust: 0.9

vendor:sunmodel:sdk 1.4.2 20scope: - version: -

Trust: 0.9

vendor:sunmodel:jdk 1.6.0 20scope: - version: -

Trust: 0.9

vendor:oraclemodel:jdk 1.6.0 27scope: - version: -

Trust: 0.9

vendor:sunmodel:jdk 04scope:eqversion:1.6

Trust: 0.9

vendor:sunmodel:jre 04scope:eqversion:1.6

Trust: 0.9

vendor:sunmodel:jre 1.6.0 19scope: - version: -

Trust: 0.9

vendor:sunmodel:jdk 1.5.0 20scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.5.0 23scope: - version: -

Trust: 0.9

vendor:oraclemodel:jdk 1.6.0 22scope: - version: -

Trust: 0.9

vendor:sunmodel:sdk 1.4.2 13scope: - version: -

Trust: 0.9

vendor:sunmodel:jdk 06scope:eqversion:1.6

Trust: 0.9

vendor:oraclemodel:jre 1.6.0 25scope: - version: -

Trust: 0.9

vendor:sunmodel:jdk 1.6.0 18scope: - version: -

Trust: 0.9

vendor:sunmodel:jdk 1.6.0 19scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 1.6.0 14scope: - version: -

Trust: 0.9

vendor:sunmodel:jre 22scope:eqversion:1.5

Trust: 0.9

vendor:googlemodel: - scope: - version: -

Trust: 0.8

vendor:microsoftmodel: - scope: - version: -

Trust: 0.8

vendor:mozillamodel: - scope: - version: -

Trust: 0.8

vendor:operamodel: - scope: - version: -

Trust: 0.8

vendor:hitachimodel:ucosminexus client )scope:eqversion:09-50

Trust: 0.6

vendor:hitachimodel:ucosminexus service platform )scope:eqversion:09-50

Trust: 0.6

vendor:sunmodel:jre .0 01scope:eqversion:1.4

Trust: 0.6

vendor:sunmodel:jdk 01-b06scope:eqversion:1.6

Trust: 0.6

vendor:hitachimodel:ucosminexus primary server base )scope:eqversion:09-50

Trust: 0.6

vendor:opensslmodel:project openssl 1.0.0ascope: - version: -

Trust: 0.6

vendor:hitachimodel:ucosminexus operator for service platform )scope:eqversion:09-00

Trust: 0.6

vendor:hitachimodel:web server linuxscope:eqversion:03-00

Trust: 0.6

vendor:hitachimodel:web server 02-04-/bscope: - version: -

Trust: 0.6

vendor:opensslmodel:project openssl 0.9.8mscope: - version: -

Trust: 0.6

vendor:sunmodel:jre 1.5.0.0 09scope: - version: -

Trust: 0.6

vendor:sunmodel:jre 1.4.2 28scope: - version: -

Trust: 0.6

vendor:sunmodel:jdk .0 04scope:eqversion:1.5

Trust: 0.6

vendor:hitachimodel:ucosminexus service architect )scope:eqversion:09-00

Trust: 0.6

vendor:hitachimodel:ucosminexus developer )scope:eqversion:09-50

Trust: 0.6

vendor:hitachimodel:ucosminexus service architect )scope:eqversion:09-50

Trust: 0.6

vendor:sunmodel:jre .0 03scope:eqversion:1.4

Trust: 0.6

vendor:hitachimodel:cosminexus http server windowsscope:eqversion:09-00

Trust: 0.6

vendor:hitachimodel:web server hp-uxscope:eqversion:03-00

Trust: 0.6

vendor:sunmodel:jdk 1.5.0.0 08scope: - version: -

Trust: 0.6

vendor:hitachimodel:web serverscope:eqversion:01-02

Trust: 0.6

vendor:hitachimodel:ucosminexus primary server base )scope:eqversion:09-00

Trust: 0.6

vendor:opensslmodel:project openssl 0.9.8nscope: - version: -

Trust: 0.6

vendor:hitachimodel:ucosminexus application server-r )scope:eqversion:09-00

Trust: 0.6

vendor:sunmodel:jdk .0 03scope:eqversion:1.5

Trust: 0.6

vendor:sunmodel:jdk 1.5.0 12scope: - version: -

Trust: 0.6

vendor:sunmodel:jre .0 02scope:eqversion:1.4

Trust: 0.6

vendor:hitachimodel:cosminexus http server windowsscope:eqversion:09-00-10

Trust: 0.6

vendor:microsoftmodel:windows server sp1scope:eqversion:2003x64

Trust: 0.6

vendor:hitachimodel:web server linuxscope:eqversion:04-00

Trust: 0.6

vendor:sunmodel:jre 1.6.0 2scope: - version: -

Trust: 0.6

vendor:hitachimodel:ucosminexus client )scope:eqversion:09-00

Trust: 0.6

vendor:sunmodel:jre 1.4.2 27scope: - version: -

Trust: 0.6

vendor:sunmodel:jdk 07-b03scope:eqversion:1.5

Trust: 0.6

vendor:sunmodel:jdk 06scope:eqversion:1.5

Trust: 0.6

vendor:sunmodel:jrescope:eqversion:1.4

Trust: 0.6

vendor:hitachimodel:ucosminexus application server-r )scope:eqversion:09-50

Trust: 0.6

vendor:sunmodel:jre 1.5.0.0 08scope: - version: -

Trust: 0.6

vendor:sunmodel:jre .0 04scope:eqversion:1.4

Trust: 0.6

vendor:hitachimodel:web serverscope:eqversion:02-04

Trust: 0.6

vendor:sunmodel:jdk 1.5.0.0 12scope: - version: -

Trust: 0.6

vendor:microsoftmodel:windows server sp2scope:eqversion:2003x64

Trust: 0.6

vendor:hitachimodel:ucosminexus operator for service platform )scope:eqversion:09-50

Trust: 0.6

vendor:sunmodel:jdk 1.5.0.0 09scope: - version: -

Trust: 0.6

vendor:opensslmodel:project openssl 0.9.8oscope: - version: -

Trust: 0.6

vendor:sunmodel:jdk 1.5.0.0 11scope: - version: -

Trust: 0.6

vendor:sunmodel:jdk 11-b03scope:eqversion:1.5

Trust: 0.6

vendor:hitachimodel:ucosminexus application serverscope:eqversion:09-50

Trust: 0.6

vendor:hitachimodel:ucosminexus application server )scope:eqversion:09-50

Trust: 0.6

vendor:sunmodel:jre 1.5.0.0 07scope: - version: -

Trust: 0.6

vendor:sunmodel:jdk 1.6.0 01scope: - version: -

Trust: 0.6

vendor:sunmodel:jre 1.6.0 20scope: - version: -

Trust: 0.6

vendor:microsoftmodel:windows xp home sp1scope: - version: -

Trust: 0.3

vendor:microsoftmodel:windows vista editionscope:eqversion:x640

Trust: 0.3

vendor:operamodel:software opera web browser beta1scope:eqversion:10.50

Trust: 0.3

vendor:oraclemodel:fusion middleware 11g releasescope:eqversion:111.1.17

Trust: 0.3

vendor:ibmmodel:power systemsscope:eqversion:740.80

Trust: 0.3

vendor:ibmmodel:java se sr8 fp1scope:eqversion:6

Trust: 0.3

vendor:redhatmodel:enterprise linux serverscope:eqversion:6

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:11.11

Trust: 0.3

vendor:applemodel:mac os serverscope:neversion:x10.7.3

Trust: 0.3

vendor:danielmodel:stenberg curlscope:eqversion:7.2

Trust: 0.3

vendor:opensslmodel:project openssl gscope:eqversion:0.9.7

Trust: 0.3

vendor:hpmodel:nonstop server h06.16.01scope: - version: -

Trust: 0.3

vendor:operamodel:software opera web browser bscope:eqversion:10.53

Trust: 0.3

vendor:redhatmodel:enterprise linux as extrasscope:eqversion:4

Trust: 0.3

vendor:microsoftmodel:windows xp professional editionscope:eqversion:x64

Trust: 0.3

vendor:applemodel:tvscope:eqversion:4.1

Trust: 0.3

vendor:avayamodel:voice portal sp1scope:eqversion:4.1

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:11.10

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.2

Trust: 0.3

vendor:danielmodel:stenberg curlscope:eqversion:7.14.1

Trust: 0.3

vendor:microsoftmodel:windows server for 32-bit systemsscope:eqversion:20080

Trust: 0.3

vendor:ibmmodel:java sescope:eqversion:7.0

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:11.50

Trust: 0.3

vendor:hitachimodel:web server windowsscope:eqversion:04-10

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9.63

Trust: 0.3

vendor:ibmmodel:power systemsscope:eqversion:740.70

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.10

Trust: 0.3

vendor:microsoftmodel:windows xp tablet pc edition sp3scope: - version: -

Trust: 0.3

vendor:microsoftmodel:windows vista business 64-bit edition x64-enterprisescope: - version: -

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.1.7

Trust: 0.3

vendor:opensslmodel:project openssl b-36.8scope:eqversion:0.9.6

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:3.0.0-68

Trust: 0.3

vendor:ibmmodel:power systems 350.c0scope: - version: -

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:10.0.648.127

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:10.04

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.225

Trust: 0.3

vendor:hpmodel:nonstop server j06.09.03scope: - version: -

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:10.50

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.219

Trust: 0.3

vendor:ibmmodel:power systemsscope:eqversion:730.30

Trust: 0.3

vendor:hitachimodel:web server windowsscope:eqversion:04-10-03

Trust: 0.3

vendor:danielmodel:stenberg curlscope:eqversion:7.15.2

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.20

Trust: 0.3

vendor:danielmodel:stenberg curlscope:eqversion:7.2.1

Trust: 0.3

vendor:ibmmodel:power systems 350.b1scope: - version: -

Trust: 0.3

vendor:hitachimodel:web server windowsscope:eqversion:04-10-01(x64)

Trust: 0.3

vendor:avayamodel:ip office application serverscope:eqversion:6.1

Trust: 0.3

vendor:ubuntumodel:linux sparcscope:eqversion:10.04

Trust: 0.3

vendor:ibmmodel:java se sr12scope:eqversion:5.0.0

Trust: 0.3

vendor:avayamodel:meeting exchangescope:eqversion:5.0.0.52

Trust: 0.3

vendor:microsoftmodel:windows server standard edition gold itaniumscope:eqversion:2008-

Trust: 0.3

vendor:ibmmodel:flex system imm2scope:eqversion:1.00

Trust: 0.3

vendor:microsoftmodel:windows server r2 enterprisescope:eqversion:2003

Trust: 0.3

vendor:hitachimodel:cosminexus developer standardscope:eqversion:0

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.1.12

Trust: 0.3

vendor:hpmodel:nonstop server h06.18.00scope: - version: -

Trust: 0.3

vendor:hpmodel:nonstop server j06.15.01scope: - version: -

Trust: 0.3

vendor:hpmodel:nonstop server h06.22.00scope: - version: -

Trust: 0.3

vendor:microsoftmodel:windows xp media center edition sp3scope:eqversion:2005

Trust: 0.3

vendor:ibmmodel:websphere datapower soa appliancescope:eqversion:3.8

Trust: 0.3

vendor:ibmmodel:websphere datapower soa appliancescope:eqversion:4.0

Trust: 0.3

vendor:ibmmodel:rational appscan enterprisescope:eqversion:8.0.0.1

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9.51

Trust: 0.3

vendor:avayamodel:meeting exchange web conferencing serverscope:eqversion:-0

Trust: 0.3

vendor:ibmmodel:java sescope:eqversion:5.0

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.1.6

Trust: 0.3

vendor:microsoftmodel:windows server r2 web editionscope:eqversion:20030

Trust: 0.3

vendor:hpmodel:system management homepage cscope:eqversion:2.1.10.186

Trust: 0.3

vendor:opensslmodel:project openssl hscope:eqversion:0.9.7

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.1.2

Trust: 0.3

vendor:opensslmodel:project openssl iscope:eqversion:0.9.7

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.2

Trust: 0.3

vendor:hpmodel:nonstop server j06.08.00scope: - version: -

Trust: 0.3

vendor:opensslmodel:project openssl bscope:eqversion:0.9.6

Trust: 0.3

vendor:microsoftmodel:windows xp home sp2scope: - version: -

Trust: 0.3

vendor:microsoftmodel:windows vista home basic sp1scope: - version: -

Trust: 0.3

vendor:hpmodel:nonstop server j06.16scope: - version: -

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.200

Trust: 0.3

vendor:hitachimodel:ucosminexus client for plug-inscope:eqversion:0

Trust: 0.3

vendor:hitachimodel:ucosminexus application serverscope:eqversion:09-00

Trust: 0.3

vendor:hpmodel:nonstop server j6.0.14.01scope: - version: -

Trust: 0.3

vendor:ibmmodel:java sdk sr10scope:neversion:6

Trust: 0.3

vendor:emcmodel:vplex geosynchrony sp1scope:eqversion:5.2

Trust: 0.3

vendor:operamodel:software opera web browser win32scope:eqversion:6.0

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:3.0.68

Trust: 0.3

vendor:oraclemodel:forms and reports 11g releasescope:eqversion:211.1.2.1

Trust: 0.3

vendor:ibmmodel:power systemsscope:eqversion:350.00

Trust: 0.3

vendor:microsoftmodel:windows for 32-bit systemsscope:eqversion:70

Trust: 0.3

vendor:ibmmodel:power systemsscope:eqversion:770.22

Trust: 0.3

vendor:avayamodel:message networkingscope:eqversion:5.2.3

Trust: 0.3

vendor:ibmmodel:flex system chassis management modulescope:eqversion:0

Trust: 0.3

vendor:hitachimodel:cosminexus application serverscope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.303

Trust: 0.3

vendor:debianmodel:linux ia-64scope:eqversion:6.0

Trust: 0.3

vendor:microsoftmodel:windows server r2scope:eqversion:2008x640

Trust: 0.3

vendor:sunmodel:jdk 1.5.0 11scope: - version: -

Trust: 0.3

vendor:operamodel:software opera web browser 1win32scope:eqversion:7.0

Trust: 0.3

vendor:hitachimodel:ucosminexus developer lightscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:flex system imm2scope:eqversion:2.00

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.211

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.104

Trust: 0.3

vendor:hpmodel:nonstop server j06.07.02scope: - version: -

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:6.0.0-95

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:10.10

Trust: 0.3

vendor:oraclemodel:jrockit r28.0.0scope: - version: -

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:8.51

Trust: 0.3

vendor:avayamodel:meeting exchange sp2scope:eqversion:5.2

Trust: 0.3

vendor:hitachimodel:web server )scope:eqversion:02-03

Trust: 0.3

vendor:danielmodel:stenberg curlscope:eqversion:7.21.6

Trust: 0.3

vendor:sunmodel:jdk 1.5.0.0 06scope: - version: -

Trust: 0.3

vendor:hitachimodel:ucosminexus service platformscope:eqversion:09-00

Trust: 0.3

vendor:hitachimodel:cosminexus developer's kit for java (windows(x8scope:neversion:09-50-01

Trust: 0.3

vendor:operamodel:software opera web browserscope:neversion:11.51

Trust: 0.3

vendor:hitachimodel:cosminexus developer's kit for javascope:neversion:09-00-06

Trust: 0.3

vendor:hitachimodel:ucosminexus application server lightscope:eqversion:0

Trust: 0.3

vendor:hpmodel:nonstop server h06.15.00scope: - version: -

Trust: 0.3

vendor:avayamodel:meeting exchangescope:eqversion:5.0

Trust: 0.3

vendor:debianmodel:linux amd64scope:eqversion:6.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:13.0.782.107

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:14

Trust: 0.3

vendor:microsoftmodel:windows server standard editionscope:eqversion:20080

Trust: 0.3

vendor:hpmodel:system management homepage bscope:eqversion:2.1.5.146

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:7.54

Trust: 0.3

vendor:microsoftmodel:windows server sp2 enterprisescope:eqversion:2008-x64

Trust: 0.3

vendor:ibmmodel:system networking ethernet switchscope:eqversion:0

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.1

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:7.51

Trust: 0.3

vendor:microsoftmodel:windows server gold standardscope:eqversion:2003

Trust: 0.3

vendor:oraclemodel:jrockit r28.1.1scope: - version: -

Trust: 0.3

vendor:ibmmodel:power systemsscope:eqversion:773.10

Trust: 0.3

vendor:microsoftmodel:windows server r2 standard editionscope:eqversion:20080

Trust: 0.3

vendor:avayamodel:aura sip enablement servicesscope:eqversion:5.2.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6

Trust: 0.3

vendor:ibmmodel:power systemsscope:eqversion:730.40

Trust: 0.3

vendor:hpmodel:system management homepage ascope:eqversion:2.1.11.197

Trust: 0.3

vendor:hitachimodel:web server hp-uxscope:eqversion:03-10

Trust: 0.3

vendor:mozillamodel:firefox beta1scope:eqversion:4.0

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.1.15210

Trust: 0.3

vendor:microsoftmodel:windows vista businessscope: - version: -

Trust: 0.3

vendor:applemodel:tvscope:eqversion:1.0

Trust: 0.3

vendor:danielmodel:stenberg curlscope:eqversion:7.17

Trust: 0.3

vendor:opensslmodel:project openssl lscope:eqversion:0.9.7

Trust: 0.3

vendor:danielmodel:stenberg curlscope:eqversion:7.11.1

Trust: 0.3

vendor:avayamodel:proactive contactscope:eqversion:4.0

Trust: 0.3

vendor:microsoftmodel:windows server for x64-based systemsscope:eqversion:20080

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:7.10

Trust: 0.3

vendor:vmwaremodel:esxscope:eqversion:4.0

Trust: 0.3

vendor:microsoftmodel:windows server standard edition gold webscope:eqversion:2008-

Trust: 0.3

vendor:avayamodel:aura communication managerscope:eqversion:5.2

Trust: 0.3

vendor:microsoftmodel:windows server itanium sp2scope:eqversion:2003

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:7.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.3

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.1.3

Trust: 0.3

vendor:microsoftmodel:windows xp home sp3scope: - version: -

Trust: 0.3

vendor:operamodel:software opera web browser win32scope:eqversion:5.12

Trust: 0.3

vendor:ibmmodel:java sdkscope:eqversion:6

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.5

Trust: 0.3

vendor:operamodel:software opera web browser beta2scope:eqversion:10.50

Trust: 0.3

vendor:sunmodel:jdk updatescope:eqversion:1.6.018

Trust: 0.3

vendor:sunmodel:jdk updatescope:eqversion:1.6.019

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.3

Trust: 0.3

vendor:opensslmodel:project openssl dscope:eqversion:0.9.6

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.17

Trust: 0.3

vendor:redhatmodel:enterprise linux hpc node optionalscope:eqversion:6

Trust: 0.3

vendor:microsoftmodel:windows vista ultimate 64-bit edition sp2scope: - version: -

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:11.00

Trust: 0.3

vendor:opensslmodel:project openssl beta2scope:eqversion:0.9.7

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.10

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.6

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3

Trust: 0.3

vendor:redhatmodel:enterprise linux server supplementaryscope:eqversion:6

Trust: 0.3

vendor:ibmmodel:power systemsscope:eqversion:350.60

Trust: 0.3

vendor:hpmodel:nonstop server j06.13.01scope: - version: -

Trust: 0.3

vendor:avayamodel:iqscope:eqversion:5.1.1

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9.25

Trust: 0.3

vendor:microsoftmodel:windows home premium sp1scope:eqversion:7-x32

Trust: 0.3

vendor:sunmodel:jdk 1.5.0 11-b03scope: - version: -

Trust: 0.3

vendor:microsoftmodel:windows server gold compute clusterscope:eqversion:2003

Trust: 0.3

vendor:avayamodel:aura communication manager utility servicesscope:eqversion:6.1

Trust: 0.3

vendor:operamodel:software opera web browser win32scope:eqversion:5.02

Trust: 0.3

vendor:emcmodel:rsa bsafe micro edition suitescope:neversion:4.0.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.19

Trust: 0.3

vendor:opensslmodel:project openssl escope:eqversion:0.9.7

Trust: 0.3

vendor:microsoftmodel:windows server standard edition gold datacenterscope:eqversion:2008-

Trust: 0.3

vendor:opensslmodel:project openssl fscope:eqversion:0.9.6

Trust: 0.3

vendor:redhatmodel:enterprise linux workstation supplementaryscope:eqversion:6

Trust: 0.3

vendor:opensslmodel:project opensslscope:eqversion:0.9.7

Trust: 0.3

vendor:novellmodel:access manager sp2scope:eqversion:3.1

Trust: 0.3

vendor:microsoftmodel:windows vista home premium sp1scope: - version: -

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9.24

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:11.04

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.696.65

Trust: 0.3

vendor:microsoftmodel:windows vista home premium 64-bit editionscope:eqversion:0

Trust: 0.3

vendor:danielmodel:stenberg curlscope:eqversion:7.15

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:10.10

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:10.60

Trust: 0.3

vendor:danielmodel:stenberg curlscope:eqversion:7.12.3

Trust: 0.3

vendor:microsoftmodel:windows server r2scope:eqversion:2003

Trust: 0.3

vendor:opensslmodel:project openssl 1.0.0cscope: - version: -

Trust: 0.3

vendor:danielmodel:stenberg curlscope:eqversion:7.19

Trust: 0.3

vendor:microsoftmodel:windows server sp1 platform sdkscope:eqversion:2003

Trust: 0.3

vendor:operamodel:software opera web browser beta1scope:eqversion:10.10

Trust: 0.3

vendor:microsoftmodel:windows server enterprise edition itanium sp1 betascope:eqversion:20031

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:10.00

Trust: 0.3

vendor:microsoftmodel:windows server sp2 betascope:eqversion:2008

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.100

Trust: 0.3

vendor:ibmmodel:java sescope:eqversion:6.0

Trust: 0.3

vendor:microsoftmodel:windows server r2 x64-datacenterscope:eqversion:2003

Trust: 0.3

vendor:hitachimodel:cosminexus http server hp-uxscope:eqversion:09-00

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.7

Trust: 0.3

vendor:microsoftmodel:windows server enterprise edition itanium sp2 itaniumscope:eqversion:2003

Trust: 0.3

vendor:microsoftmodel:windows for 32-bit systems sp1scope:eqversion:7

Trust: 0.3

vendor:microsoftmodel:windows vista business 64-bit edition x64-ultimatescope: - version: -

Trust: 0.3

vendor:microsoftmodel:windows xp professional edition sp3scope:eqversion:x64

Trust: 0.3

vendor:avayamodel:proactive contactscope:eqversion:4.2.1

Trust: 0.3

vendor:hpmodel:nonstop server j06.15scope: - version: -

Trust: 0.3

vendor:applemodel:mac osscope:neversion:x10.9.2

Trust: 0.3

vendor:avayamodel:aura presence servicesscope:eqversion:6.0

Trust: 0.3

vendor:microsoftmodel:windows rcscope:eqversion:7

Trust: 0.3

vendor:microsoftmodel:windows server for 32-bit systems sp2scope:eqversion:2008

Trust: 0.3

vendor:sunmodel:jre 07scope:eqversion:1.4.1

Trust: 0.3

vendor:avayamodel:callpilotscope:eqversion:5.0

Trust: 0.3

vendor:microsoftmodel:windows vista home premiumscope: - version: -

Trust: 0.3

vendor:hitachimodel:cosminexusscope:eqversion:9.0

Trust: 0.3

vendor:emcmodel:vplex geosynchronyscope:eqversion:4.0

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.4

Trust: 0.3

vendor:hitachimodel:web server windowsscope:eqversion:03-10-10

Trust: 0.3

vendor:hitachimodel:ucosminexus application server enterprise )scope:eqversion:09-80

Trust: 0.3

vendor:avayamodel:aura system platformscope:eqversion:6.0.2

Trust: 0.3

vendor:debianmodel:linux s/390scope:eqversion:6.0

Trust: 0.3

vendor:avayamodel:aura experience portalscope:eqversion:6.0

Trust: 0.3

vendor:keriomodel:control patchscope:eqversion:7.1.01

Trust: 0.3

vendor:opensslmodel:project openssl beta3scope:eqversion:1.0

Trust: 0.3

vendor:applemodel:ipadscope:eqversion:0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:6

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:10.0.648.133

Trust: 0.3

vendor:hpmodel:nonstop server h06.21.01scope: - version: -

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.1.3.132

Trust: 0.3

vendor:danielmodel:stenberg curlscope:eqversion:7.13.2

Trust: 0.3

vendor:novellmodel:access manager sp1scope:eqversion:3.1

Trust: 0.3

vendor:susemodel:linux enterprise java sp1scope:eqversion:11

Trust: 0.3

vendor:sunmodel:jre 1.5.0 08scope: - version: -

Trust: 0.3

vendor:operamodel:software opera web browserscope:neversion:11.60

Trust: 0.3

vendor:ibmmodel:power systemsscope:eqversion:350.20

Trust: 0.3

vendor:hitachimodel:web server windowsscope:eqversion:03-00-060

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.101

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:6.2

Trust: 0.3

vendor:hitachimodel:ucosminexus application server smart editionscope:eqversion:0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.14

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.8

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:8.52

Trust: 0.3

vendor:hitachimodel:cosminexus developerscope:eqversion:6.0

Trust: 0.3

vendor:avayamodel:meeting exchange recording serverscope:eqversion:-0

Trust: 0.3

vendor:applemodel:mac osscope:neversion:x10.7.4

Trust: 0.3

vendor:hitachimodel:cosminexus developerscope:eqversion:5

Trust: 0.3

vendor:redhatmodel:desktop extrasscope:eqversion:4

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:10.52

Trust: 0.3

vendor:hpmodel:nonstop server j06.06.01scope: - version: -

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.1.5

Trust: 0.3

vendor:microsoftmodel:windows server web edition sp2scope:eqversion:2003

Trust: 0.3

vendor:ibmmodel:openpages grc platformscope:eqversion:5.0

Trust: 0.3

vendor:microsoftmodel:windows server r2 enterprise edition sp2scope:eqversion:20030

Trust: 0.3

vendor:emcmodel:rsa bsafe ssl-cscope:neversion:2.8.6

Trust: 0.3

vendor:hpmodel:nonstop server j06.06.03scope: - version: -

Trust: 0.3

vendor:hpmodel:nonstop server h06.17.01scope: - version: -

Trust: 0.3

vendor:applemodel:iosscope:neversion:5

Trust: 0.3

vendor:sunmodel:jdk update21scope:eqversion:1.5.0

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.3

Trust: 0.3

vendor:siemensmodel:simatic rf68xrscope:neversion:3.2.1

Trust: 0.3

vendor:hpmodel:network node manager iscope:eqversion:9.1

Trust: 0.3

vendor:microsoftmodel:windows server standard edition release candidatescope:eqversion:2008

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.1

Trust: 0.3

vendor:microsoftmodel:windows server standard edition sp2 webscope:eqversion:2008-

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:5.2.2

Trust: 0.3

vendor:oraclemodel:fusion middlewarescope:eqversion:12.1.3.0.0

Trust: 0.3

vendor:oraclemodel:database 11g releasescope:eqversion:211.2.0.3

Trust: 0.3

vendor:ibmmodel:rational appscan enterprisescope:eqversion:8.5.0.1

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9.5

Trust: 0.3

vendor:microsoftmodel:windows server terminal servicesscope:eqversion:20030

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:8.54

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.9

Trust: 0.3

vendor:hpmodel:nonstop server h06.17.03scope: - version: -

Trust: 0.3

vendor:operamodel:software opera web browser betascope:eqversion:83

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:9.0.597.84

Trust: 0.3

vendor:sunmodel:jre 21scope:eqversion:1.4.2

Trust: 0.3

vendor:redhatmodel:enterprise linux hpc nodescope:eqversion:6

Trust: 0.3

vendor:microsoftmodel:windows server standard editionscope:eqversion:2003

Trust: 0.3

vendor:opensslmodel:project openssl 0.9.8sscope: - version: -

Trust: 0.3

vendor:applemodel:ios betascope:eqversion:4.2

Trust: 0.3

vendor:microsoftmodel:windows vista home premium 64-bit edition sp1scope: - version: -

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:5.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.2

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:6.1.0.103

Trust: 0.3

vendor:avayamodel:cms serverscope:eqversion:16.2

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:0

Trust: 0.3

vendor:redhatmodel:enterprise linux serverscope:eqversion:5

Trust: 0.3

vendor:microsoftmodel:windows vista business 64-bit edition x86-ultimatescope: - version: -

Trust: 0.3

vendor:susemodel:linux enterprise java sp4scope:eqversion:10

Trust: 0.3

vendor:ibmmodel:java se sr1scope:neversion:7

Trust: 0.3

vendor:microsoftmodel:windows server gold datacenterscope:eqversion:2003

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:7.53

Trust: 0.3

vendor:avayamodel:iqscope:eqversion:5

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:7.21

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.1.4

Trust: 0.3

vendor:microsoftmodel:windows server r2 enterprise editionscope:eqversion:20030

Trust: 0.3

vendor:ibmmodel:power systemsscope:eqversion:350.70

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.1.1

Trust: 0.3

vendor:applemodel:tvscope:eqversion:2.1

Trust: 0.3

vendor:hpmodel:nonstop server h06.27scope: - version: -

Trust: 0.3

vendor:danielmodel:stenberg curlscope:eqversion:7.20.2

Trust: 0.3

vendor:hpmodel:nonstop server j06.14.02scope: - version: -

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:12.0.742.100

Trust: 0.3

vendor:applemodel:tvscope:eqversion:4.2

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.1.10.186

Trust: 0.3

vendor:ibmmodel:rational appscan standardscope:eqversion:7.8

Trust: 0.3

vendor:microsoftmodel:windows server datacenter edition sp2scope:eqversion:2003x64

Trust: 0.3

vendor:oraclemodel:jrockit r27.6.0-50scope:eqversion:1.5.015

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.105

Trust: 0.3

vendor:microsoftmodel:windows server r2 datacenter editionscope:eqversion:20030

Trust: 0.3

vendor:opensslmodel:project openssl bscope:eqversion:0.9.8

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:8.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.7

Trust: 0.3

vendor:sunmodel:jdk 01scope:eqversion:1.6

Trust: 0.3

vendor:hpmodel:nonstop server j06.08.02scope: - version: -

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.306

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.1.2

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9.64

Trust: 0.3

vendor:opensslmodel:project openssl kscope:eqversion:0.9.8

Trust: 0.3

vendor:microsoftmodel:windows server sp1 compute clusterscope:eqversion:2003

Trust: 0.3

vendor:danielmodel:stenberg curlscope:eqversion:7.13

Trust: 0.3

vendor:ibmmodel:java sescope:eqversion:6

Trust: 0.3

vendor:hitachimodel:web server hp-uxscope:eqversion:04-10-02

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:1.1

Trust: 0.3

vendor:operamodel:software opera web browser win32 betascope:eqversion:7.01

Trust: 0.3

vendor:oraclemodel:jrockit r27.6.5scope: - version: -

Trust: 0.3

vendor:sunmodel:sdkscope:eqversion:1.4.222

Trust: 0.3

vendor:avayamodel:aura system platformscope:eqversion:6.0

Trust: 0.3

vendor:oraclemodel:solarisscope:eqversion:10

Trust: 0.3

vendor:danielmodel:stenberg curlscope:eqversion:7.18

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:9.0.597.107

Trust: 0.3

vendor:ibmmodel:java se sr10scope:eqversion:5.0

Trust: 0.3

vendor:hpmodel:nonstop server j06.04.02scope: - version: -

Trust: 0.3

vendor:hitachimodel:web server solarisscope:eqversion:04-00-01

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:3.0.2.77

Trust: 0.3

vendor:operamodel:software opera web browser linuxscope:eqversion:6.0.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.217

Trust: 0.3

vendor:microsoftmodel:windows vista business 64-bit edition x86-enterprisescope: - version: -

Trust: 0.3

vendor:ibmmodel:power systemsscope:eqversion:740.40

Trust: 0.3

vendor:susemodel:linux enterprise server sp4scope:eqversion:10

Trust: 0.3

vendor:microsoftmodel:windows server gold x64-datacenterscope:eqversion:2003

Trust: 0.3

vendor:mandrivamodel:business serverscope:eqversion:1

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:7.22

Trust: 0.3

vendor:redhatmodel:enterprise linux extrasscope:eqversion:4

Trust: 0.3

vendor:hitachimodel:ucosminexus operatorscope:eqversion:0

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:6.0.96

Trust: 0.3

vendor:avayamodel:voice portalscope:eqversion:5.1.2

Trust: 0.3

vendor:hitachimodel:web server security enhancementscope:eqversion:-0

Trust: 0.3

vendor:avayamodel:aura application server sip corescope:eqversion:53002.0

Trust: 0.3

vendor:avayamodel:voice portalscope:eqversion:5.0

Trust: 0.3

vendor:sunmodel:java system application serverscope:eqversion:8.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.696.77

Trust: 0.3

vendor:avayamodel:aura sip enablement servicesscope:eqversion:5.0

Trust: 0.3

vendor:opensslmodel:project openssl gscope:eqversion:0.9.6

Trust: 0.3

vendor:avayamodel:aura messagingscope:eqversion:6.0

Trust: 0.3

vendor:microsoftmodel:windows server for itanium-based systems r2scope:eqversion:2008

Trust: 0.3

vendor:oraclemodel:solarisscope:eqversion:11.1

Trust: 0.3

vendor:emcmodel:rsa bsafe ssl-jscope:eqversion:6.0

Trust: 0.3

vendor:microsoftmodel:windows server for itanium-based systemsscope:eqversion:20080

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:13.0.782.112

Trust: 0.3

vendor:ibmmodel:websphere datapower soa appliancescope:eqversion:4.0.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.344

Trust: 0.3

vendor:hitachimodel:cosminexus developer's kit for java (windows(x8scope:neversion:09-00-06

Trust: 0.3

vendor:sunmodel:jdk update24scope:eqversion:1.5.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:13.0.782.215

Trust: 0.3

vendor:avayamodel:meeting exchange client registration serverscope:eqversion:-0

Trust: 0.3

vendor:ibmmodel:openpages grc platformscope:eqversion:5.5.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.1

Trust: 0.3

vendor:avayamodel:proactive contactscope:eqversion:4.2.2

Trust: 0.3

vendor:redhatmodel:enterprise linux desktop supplementaryscope:eqversion:6

Trust: 0.3

vendor:ibmmodel:rational appscan enterprisescope:eqversion:8.0.1.1

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:6.1.0.102

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.696.57

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.0

Trust: 0.3

vendor:ibmmodel:power systemsscope:eqversion:760.31

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.18

Trust: 0.3

vendor:avayamodel:voice portal sp1scope:eqversion:5.0

Trust: 0.3

vendor:microsoftmodel:windows server enterprise edition sp1 betascope:eqversion:20031

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.0.2

Trust: 0.3

vendor:hitachimodel:web server hp-uxscope:eqversion:03-00-05

Trust: 0.3

vendor:ibmmodel:power systemsscope:eqversion:740.81

Trust: 0.3

vendor:mandrivamodel:linux mandrake x86 64scope:eqversion:2011

Trust: 0.3

vendor:sunmodel:jdk 1.5.0.0 04scope: - version: -

Trust: 0.3

vendor:vmwaremodel:vcenterscope:eqversion:5.0

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.1

Trust: 0.3

vendor:avayamodel:aura session manager sp1scope:eqversion:6.1

Trust: 0.3

vendor:danielmodel:stenberg curlscope:eqversion:7.11.2

Trust: 0.3

vendor:avayamodel:iqscope:eqversion:5.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.215

Trust: 0.3

vendor:microsoftmodel:windows server r2 standard editionscope:eqversion:20030

Trust: 0.3

vendor:opensslmodel:project openssl hscope:eqversion:0.9.6

Trust: 0.3

vendor:microsoftmodel:windows server r2 for x64-based systems sp1scope:eqversion:2008

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:6.1

Trust: 0.3

vendor:opensslmodel:project openssl ascope:eqversion:0.9.5

Trust: 0.3

vendor:operamodel:software opera web browser jscope:eqversion:7.11

Trust: 0.3

vendor:opensslmodel:project openssl iscope:eqversion:0.9.6

Trust: 0.3

vendor:hpmodel:nonstop server h06.25scope: - version: -

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.302

Trust: 0.3

vendor:danielmodel:stenberg curlscope:eqversion:7.19.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.5

Trust: 0.3

vendor:microsoftmodel:windows vista business 64-bit edition sp1 x86-enterprisescope: - version: -

Trust: 0.3

vendor:sunmodel:jdk updatescope:eqversion:1.6.04

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:3.0.1-73

Trust: 0.3

vendor:ibmmodel:power systems 350.b0scope: - version: -

Trust: 0.3

vendor:ibmmodel:openpages grc platformscope:eqversion:5.5.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.13

Trust: 0.3

vendor:oraclemodel:database 11g releasescope:eqversion:211.2.0.2

Trust: 0.3

vendor:danielmodel:stenberg curlscope:eqversion:7.20

Trust: 0.3

vendor:microsoftmodel:windows vista edition sp2scope:eqversion:x64

Trust: 0.3

vendor:redhatmodel:enterprise linux for sap serverscope:eqversion:5

Trust: 0.3

vendor:ibmmodel:security appscan standardscope:neversion:8.6

Trust: 0.3

vendor:ibmmodel:power systemsscope:eqversion:740.00

Trust: 0.3

vendor:avayamodel:meeting exchange sp1scope:eqversion:5.2

Trust: 0.3

vendor:opensslmodel:project openssl cscope:eqversion:0.9.6

Trust: 0.3

vendor:opensslmodel:project opensslscope:eqversion:1.0.2

Trust: 0.3

vendor:opensslmodel:project openssl beta2scope:eqversion:1.0

Trust: 0.3

vendor:hpmodel:system management homepage bscope:eqversion:3.0.2.77

Trust: 0.3

vendor:ibmmodel:java se sr9scope:eqversion:6.0.0

Trust: 0.3

vendor:debianmodel:linux mipsscope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.696.68

Trust: 0.3

vendor:ibmmodel:power systemsscope:eqversion:760.30

Trust: 0.3

vendor:hpmodel:nonstop server j06.07.00scope: - version: -

Trust: 0.3

vendor:avayamodel:message networking sp1scope:eqversion:5.2

Trust: 0.3

vendor:susemodel:linux enterprise server for vmware sp1scope:eqversion:11

Trust: 0.3

vendor:opensslmodel:project opensslscope:eqversion:0.9.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.549.0

Trust: 0.3

vendor:sunmodel:jdk updatescope:eqversion:1.6.013

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:8.50

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.13

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.207

Trust: 0.3

vendor:sunmodel:jdkscope:eqversion:1.5

Trust: 0.3

vendor:opensslmodel:project openssl cscope:eqversion:0.9.1

Trust: 0.3

vendor:ibmmodel:power systemsscope:eqversion:350.80

Trust: 0.3

vendor:hpmodel:nonstop server j06.08.04scope: - version: -

Trust: 0.3

vendor:ibmmodel:rational appscan standardscope:eqversion:8.5.0.1

Trust: 0.3

vendor:ibmmodel:flex system cmm 1.40.2qscope: - version: -

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:6.06

Trust: 0.3

vendor:mandrakesoftmodel:enterprise server x86 64scope:eqversion:5

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:6.0.1

Trust: 0.3

vendor:sunmodel:jdk 07scope:eqversion:1.5

Trust: 0.3

vendor:hitachimodel:cosminexus developer's kit for java (windows(x6scope:neversion:09-50-01

Trust: 0.3

vendor:applemodel:tvscope:neversion:4.4

Trust: 0.3

vendor:hpmodel:nonstop server h06.24scope: - version: -

Trust: 0.3

vendor:novellmodel:access managerscope:eqversion:3.1

Trust: 0.3

vendor:microsoftmodel:windows server datacenter editionscope:eqversion:2003x64

Trust: 0.3

vendor:hpmodel:nonstop server h06.16.00scope: - version: -

Trust: 0.3

vendor:hitachimodel:ucosminexus developer professional for plug-inscope:eqversion:0

Trust: 0.3

vendor:hpmodel:nonstop server h06.18.02scope: - version: -

Trust: 0.3

vendor:avayamodel:meeting exchangescope:eqversion:5.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.223

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9.23

Trust: 0.3

vendor:microsoftmodel:windows server sp1scope:eqversion:2003

Trust: 0.3

vendor:hitachimodel:cosminexusscope:eqversion:6.0

Trust: 0.3

vendor:sunmodel:jdk update13scope:eqversion:1.5.0

Trust: 0.3

vendor:operamodel:software opera web browser linuxscope:eqversion:6.0.3

Trust: 0.3

vendor:microsoftmodel:windows server r2 datacenter edition sp2scope:eqversion:20030

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:4.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:13

Trust: 0.3

vendor:microsoftmodel:windows server gold x64-enterprisescope:eqversion:2003

Trust: 0.3

vendor:hpmodel:nonstop server h06.19.02scope: - version: -

Trust: 0.3

vendor:microsoftmodel:windows for itanium-based systems sp1scope:eqversion:7

Trust: 0.3

vendor:avayamodel:proactive contactscope:eqversion:4.1

Trust: 0.3

vendor:opensslmodel:project openssl 1.0.0escope: - version: -

Trust: 0.3

vendor:microsoftmodel:windows server enterprise edition sp1scope:eqversion:2003

Trust: 0.3

vendor:ibmmodel:power systemsscope:eqversion:773.00

Trust: 0.3

vendor:opensslmodel:project openssl beta1scope:eqversion:1.0

Trust: 0.3

vendor:opensslmodel:project openssl ascope:eqversion:0.9.8

Trust: 0.3

vendor:vmwaremodel:esxscope:eqversion:4.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:10.0.648.128

Trust: 0.3

vendor:oraclemodel:jrockit r28.0.1scope: - version: -

Trust: 0.3

vendor:sunmodel:jdk update19scope:eqversion:1.5.0

Trust: 0.3

vendor:ibmmodel:openpages grc platformscope:neversion:6.2.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.0

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.7.3

Trust: 0.3

vendor:ibmmodel:power systemsscope:eqversion:740.15

Trust: 0.3

vendor:microsoftmodel:windows server r2scope:eqversion:2003x64

Trust: 0.3

vendor:operamodel:software opera web browser beta buildscope:eqversion:7.2012981

Trust: 0.3

vendor:opensslmodel:project openssl cscope:eqversion:0.9.7

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.222

Trust: 0.3

vendor:microsoftmodel:windows server for x64-based systems r2scope:eqversion:2008

Trust: 0.3

vendor:avayamodel:message networkingscope:eqversion:5.2.2

Trust: 0.3

vendor:microsoftmodel:windows server datacenter edition sp1 betascope:eqversion:20031

Trust: 0.3

vendor:microsoftmodel:windows server r2 datacenter sp1scope:eqversion:2008

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:11.04

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.1.14.20

Trust: 0.3

vendor:hitachimodel:cosminexus studio standard editionscope:eqversion:-0

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9

Trust: 0.3

vendor:microsoftmodel:windows xp tablet pc edition sp2scope: - version: -

Trust: 0.3

vendor:opensslmodel:project openssl lscope:eqversion:0.9.6

Trust: 0.3

vendor:hitachimodel:web serverscope:eqversion:02-05

Trust: 0.3

vendor:oraclemodel:enterprise linuxscope:eqversion:6

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:8.53

Trust: 0.3

vendor:avayamodel:cms serverscope:eqversion:16.1

Trust: 0.3

vendor:microsoftmodel:windows server r2 itaniumscope:eqversion:20080

Trust: 0.3

vendor:microsoftmodel:windows xp professional sp1scope: - version: -

Trust: 0.3

vendor:microsoftmodel:windows server for itanium-based systems sp2scope:eqversion:2008

Trust: 0.3

vendor:hpmodel:nonstop server j06.11.01scope: - version: -

Trust: 0.3

vendor:ibmmodel:java se sr9-fp2scope:eqversion:6.0.0

Trust: 0.3

vendor:collaxmodel:business serverscope:eqversion:5.5.11

Trust: 0.3

vendor:ibmmodel:power systemsscope:eqversion:730.72

Trust: 0.3

vendor:microsoftmodel:windows server standard edition sp2 hpcscope:eqversion:2008-

Trust: 0.3

vendor:mandrivamodel:linux mandrakescope:eqversion:2011

Trust: 0.3

vendor:vmwaremodel:update manager updatescope:neversion:5.01

Trust: 0.3

vendor:hitachimodel:ucosminexus developer professionalscope:eqversion:0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.551.1

Trust: 0.3

vendor:sunmodel:glassfish enterprise serverscope:eqversion:2.1.1

Trust: 0.3

vendor:microsoftmodel:windows vista ultimatescope: - version: -

Trust: 0.3

vendor:ibmmodel:power systemsscope:eqversion:740.10

Trust: 0.3

vendor:ibmmodel:power systemsscope:eqversion:740.20

Trust: 0.3

vendor:vmwaremodel:virtualcenterscope:eqversion:2.5

Trust: 0.3

vendor:oraclemodel:jrockit r27.6.7scope: - version: -

Trust: 0.3

vendor:ibmmodel:rational appscan enterprisescope:eqversion:8.0.1

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:10.01

Trust: 0.3

vendor:hpmodel:nonstop server h06.20.00scope: - version: -

Trust: 0.3

vendor:vmwaremodel:vcenterscope:eqversion:4.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:12

Trust: 0.3

vendor:ibmmodel:power systemsscope:eqversion:730.20

Trust: 0.3

vendor:sunmodel:jre 10-b03scope:eqversion:1.4.2

Trust: 0.3

vendor:oraclemodel:jrockit r27.6.0scope: - version: -

Trust: 0.3

vendor:ibmmodel:power systemsscope:eqversion:740.61

Trust: 0.3

vendor:hpmodel:hp-ux b.11.31scope: - version: -

Trust: 0.3

vendor:ibmmodel:java sescope:eqversion:1.4.2

Trust: 0.3

vendor:opensslmodel:project openssl escope:eqversion:0.9.6

Trust: 0.3

vendor:ibmmodel:rational appscan enterprisescope:eqversion:8.0.0

Trust: 0.3

vendor:ibmmodel:power systemsscope:eqversion:350.90

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.7.1

Trust: 0.3

vendor:avayamodel:messaging storage server sp1scope:eqversion:5.2

Trust: 0.3

vendor:hpmodel:nonstop server j06.05.02scope: - version: -

Trust: 0.3

vendor:sunmodel:jre 07scope:eqversion:1.5

Trust: 0.3

vendor:hpmodel:nonstop server j06.07.01scope: - version: -

Trust: 0.3

vendor:opensslmodel:project opensslscope:eqversion:0.9.6

Trust: 0.3

vendor:microsoftmodel:windows server goldscope:eqversion:2003

Trust: 0.3

vendor:avayamodel:aura session manager sp1scope:eqversion:6.0

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.4

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:10.53

Trust: 0.3

vendor:danielmodel:stenberg curlscope:eqversion:7.10.8

Trust: 0.3

vendor:danielmodel:stenberg curlscope:eqversion:7.20.1

Trust: 0.3

vendor:ibmmodel:power systemsscope:eqversion:730.71

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.0.1.104

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.220

Trust: 0.3

vendor:ibmmodel:java ibm 31-bit sdk for z/osscope:eqversion:5.0

Trust: 0.3

vendor:avayamodel:aura session manager sp2scope:eqversion:6.1

Trust: 0.3

vendor:microsoftmodel:windows server enterprise editionscope:eqversion:20080

Trust: 0.3

vendor:opensslmodel:project openssl kscope:eqversion:0.9.7

Trust: 0.3

vendor:danielmodel:stenberg curlscope:eqversion:7.16.4

Trust: 0.3

vendor:hitachimodel:cosminexus developer professionalscope:eqversion:0

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:5.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.10

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:3.0.1.73

Trust: 0.3

vendor:opensslmodel:project openssl beta3scope:eqversion:0.9.7

Trust: 0.3

vendor:ibmmodel:java se sr5scope:eqversion:6.0

Trust: 0.3

vendor:emcmodel:rsa bsafe ssl-cscope:eqversion:2.8.5

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:7.0

Trust: 0.3

vendor:hitachimodel:cosminexus http server windowsscope:neversion:09-00-11

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:6.1.1

Trust: 0.3

vendor:ibmmodel:power systemsscope:eqversion:760.00

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.102

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.8

Trust: 0.3

vendor:hpmodel:nonstop server h06.21.00scope: - version: -

Trust: 0.3

vendor:microsoftmodel:windows vista business 64-bit edition sp1 x64-enterprisescope: - version: -

Trust: 0.3

vendor:operamodel:software opera web browser linuxscope:eqversion:6.10

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9.20

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.16

Trust: 0.3

vendor:ibmmodel:java sescope:eqversion:7

Trust: 0.3

vendor:operamodel:software opera web browser beta1scope:eqversion:10.60

Trust: 0.3

vendor:operamodel:software opera web browser win32scope:eqversion:6.0.5

Trust: 0.3

vendor:hitachimodel:ucosminexus service platform aixscope:eqversion:09-00(64)

Trust: 0.3

vendor:hitachimodel:web server windowsscope:eqversion:04-10-03(x64)

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:0

Trust: 0.3

vendor:susemodel:linux enterprise software development kit sp1scope:eqversion:11

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.1.8.179

Trust: 0.3

vendor:hitachimodel:web server aixscope:eqversion:03-00

Trust: 0.3

vendor:operamodel:software opera web browser beta1scope:eqversion:10.00

Trust: 0.3

vendor:ibmmodel:power systemsscope:eqversion:770.20

Trust: 0.3

vendor:ibmmodel:power systems 350.d0scope: - version: -

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.224

Trust: 0.3

vendor:collaxmodel:business serverscope:neversion:5.5.12

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9.61

Trust: 0.3

vendor:ibmmodel:flex system managerscope:eqversion:0

Trust: 0.3

vendor:redhatmodel:enterprise linux desktop optionalscope:eqversion:6

Trust: 0.3

vendor:redhatmodel:enterprise linux hpc node supplementaryscope:eqversion:6

Trust: 0.3

vendor:redhatmodel:enterprise linux desktop supplementary clientscope:eqversion:5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.308

Trust: 0.3

vendor:avayamodel:ip office application serverscope:eqversion:7.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.8.5

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:10.04

Trust: 0.3

vendor:danielmodel:stenberg curlscope:eqversion:7.10.6

Trust: 0.3

vendor:sunmodel:jdk update17scope:eqversion:1.5.0

Trust: 0.3

vendor:microsoftmodel:windows server datacenter edition sp2scope:eqversion:2008

Trust: 0.3

vendor:avayamodel:message networkingscope:eqversion:5.2.4

Trust: 0.3

vendor:ibmmodel:rational appscan enterprisescope:eqversion:8.6

Trust: 0.3

vendor:avayamodel:aura system platformscope:eqversion:6.0.1

Trust: 0.3

vendor:microsoftmodel:windows server enterprise editionscope:eqversion:2003x64

Trust: 0.3

vendor:hitachimodel:cosminexus http serverscope:neversion:09-00-13

Trust: 0.3

vendor:danielmodel:stenberg curlscope:eqversion:7.12

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:10.54

Trust: 0.3

vendor:hpmodel:nonstop server j06.05.00scope: - version: -

Trust: 0.3

vendor:operamodel:software opera web browser .6win32scope:eqversion:6.0

Trust: 0.3

vendor:ibmmodel:openpages grc platformscope:eqversion:5.1

Trust: 0.3

vendor:sunmodel:sdkscope:eqversion:1.4.221

Trust: 0.3

vendor:sunmodel:sdk 02scope:eqversion:1.4.2

Trust: 0.3

vendor:debianmodel:linux ia-32scope:eqversion:6.0

Trust: 0.3

vendor:sunmodel:solarisscope:eqversion:11

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.201

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.11

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.672.2

Trust: 0.3

vendor:sunmodel:jdk 0 03scope:eqversion:1.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:10

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.1

Trust: 0.3

vendor:sunmodel:jdk update20scope:eqversion:1.5.0

Trust: 0.3

vendor:microsoftmodel:windows server standard edition r2scope:eqversion:2008

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9.62

Trust: 0.3

vendor:avayamodel:proactive contactscope:eqversion:4.0.1

Trust: 0.3

vendor:ibmmodel:power systemsscope:eqversion:730.61

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.237

Trust: 0.3

vendor:susemodel:linux enterprise desktop sp4scope:eqversion:10

Trust: 0.3

vendor:microsoftmodel:windows vista business 64-bit edition sp2scope: - version: -

Trust: 0.3

vendor:hpmodel:nonstop server h06.17.02scope: - version: -

Trust: 0.3

vendor:debianmodel:linux powerpcscope:eqversion:6.0

Trust: 0.3

vendor:ibmmodel:power systemsscope:eqversion:773.02

Trust: 0.3

vendor:ibmmodel:power systemsscope:eqversion:770.31

Trust: 0.3

vendor:hpmodel:nonstop server j06.08.03scope: - version: -

Trust: 0.3

vendor:avayamodel:aura conferencing standardscope:eqversion:6.0

Trust: 0.3

vendor:hpmodel:nonstop server j06.10.01scope: - version: -

Trust: 0.3

vendor:microsoftmodel:windows vista home premium 64-bit edition sp2scope: - version: -

Trust: 0.3

vendor:microsoftmodel:windows xp embedded sp2scope: - version: -

Trust: 0.3

vendor:microsoftmodel:windows server datacenter edition itanium sp1scope:eqversion:2003

Trust: 0.3

vendor:hpmodel:nonstop server h06.17.00scope: - version: -

Trust: 0.3

vendor:xeroxmodel:freeflow print server 91.d2.32scope: - version: -

Trust: 0.3

vendor:microsoftmodel:windows vista business 64-bit edition sp1scope: - version: -

Trust: 0.3

vendor:hitachimodel:cosminexus server web editionscope:eqversion:0

Trust: 0.3

vendor:susemodel:linux enterprise for sap applications sp1scope:eqversion:11

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.2.6

Trust: 0.3

vendor:emcmodel:rsa bsafe micro edition suitescope:eqversion:3.1

Trust: 0.3

vendor:microsoftmodel:windows vista enterprise 64-bit edition sp1scope: - version: -

Trust: 0.3

vendor:microsoftmodel:windows server sp1 storagescope:eqversion:2003

Trust: 0.3

vendor:opensslmodel:project openssl 1.0.0dscope: - version: -

Trust: 0.3

vendor:avayamodel:meeting exchange streaming serverscope:eqversion:-0

Trust: 0.3

vendor:hitachimodel:processing kit for xmlscope:eqversion:0

Trust: 0.3

vendor:emcmodel:rsa bsafe micro edition suitescope:neversion:3.2.6

Trust: 0.3

vendor:ibmmodel:java se sr11 pf1scope:eqversion:5.0

Trust: 0.3

vendor:ibmmodel:lotus dominoscope:eqversion:8.5.3

Trust: 0.3

vendor:hitachimodel:web server hp-uxscope:eqversion:04-00

Trust: 0.3

vendor:collaxmodel:groupware suitescope:eqversion:5.5.11

Trust: 0.3

vendor:hitachimodel:cosminexus studio web editionscope:eqversion:-0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.213

Trust: 0.3

vendor:hpmodel:nonstop server h06.15.02scope: - version: -

Trust: 0.3

vendor:avayamodel:voice portal sp2scope:eqversion:4.1

Trust: 0.3

vendor:sunmodel:jdk updatescope:eqversion:1.6.06

Trust: 0.3

vendor:hitachimodel:cosminexus application server standardscope:eqversion:0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.15

Trust: 0.3

vendor:microsoftmodel:windows server standard edition itaniumscope:eqversion:2008

Trust: 0.3

vendor:hpmodel:nonstop server j06.14scope: - version: -

Trust: 0.3

vendor:sunmodel:sdk 01scope:eqversion:1.4.2

Trust: 0.3

vendor:ibmmodel:power systemsscope:eqversion:760.40

Trust: 0.3

vendor:ibmmodel:power systemsscope:eqversion:730.70

Trust: 0.3

vendor:microsoftmodel:windows vista ultimate 64-bit editionscope:eqversion:0

Trust: 0.3

vendor:hitachimodel:ucosminexus application server standardscope:eqversion:0

Trust: 0.3

vendor:debianmodel:linux sparcscope:eqversion:6.0

Trust: 0.3

vendor:ibmmodel:openpages grc platformscope:eqversion:5.5

Trust: 0.3

vendor:sunmodel:jre 1.5.0 09-b03scope: - version: -

Trust: 0.3

vendor:ibmmodel:system integrated management modulescope:eqversion:x2

Trust: 0.3

vendor:microsoftmodel:windows vista enterprise 64-bit editionscope:eqversion:0

Trust: 0.3

vendor:hpmodel:nonstop server h06.26scope: - version: -

Trust: 0.3

vendor:emcmodel:rsa bsafe ssl-jscope:eqversion:5.1.1

Trust: 0.3

vendor:microsoftmodel:windows server web edition sp1scope:eqversion:2003

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.218

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:10.10

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.7.2

Trust: 0.3

vendor:hpmodel:nonstop server j06.13scope: - version: -

Trust: 0.3

vendor:avayamodel:aura communication managerscope:eqversion:5.1

Trust: 0.3

vendor:danielmodel:stenberg curlscope:eqversion:7.14

Trust: 0.3

vendor:mandrivamodel:linux mandrake x86 64scope:eqversion:2010.1

Trust: 0.3

vendor:opensslmodel:project openssl jscope:eqversion:0.9.8

Trust: 0.3

vendor:ibmmodel:power systemsscope:eqversion:770.21

Trust: 0.3

vendor:hpmodel:nonstop server j06.09.04scope: - version: -

Trust: 0.3

vendor:hitachimodel:web server windowsscope:eqversion:03-10

Trust: 0.3

vendor:applemodel:mac osscope:neversion:x10.7.3

Trust: 0.3

vendor:avayamodel:meeting exchange sp2scope:eqversion:5.0

Trust: 0.3

vendor:avayamodel:messaging application serverscope:eqversion:4

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.1.6.156

Trust: 0.3

vendor:microsoftmodel:windows for itanium-based systemsscope:eqversion:70

Trust: 0.3

vendor:avayamodel:irscope:eqversion:4.0

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.1.10

Trust: 0.3

vendor:opensslmodel:project opensslscope:eqversion:1.0

Trust: 0.3

vendor:vmwaremodel:esxscope:eqversion:3.5

Trust: 0.3

vendor:ibmmodel:power systemsscope:eqversion:730.45

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.7

Trust: 0.3

vendor:operamodel:software opera web browser macscope:eqversion:5.0

Trust: 0.3

vendor:hpmodel:nonstop server j06.05.01scope: - version: -

Trust: 0.3

vendor:hitachimodel:cosminexus server standard editionscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:rational policy testerscope:eqversion:8.5.0.1

Trust: 0.3

vendor:avayamodel:messaging storage serverscope:eqversion:5.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.216

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:6.1.1

Trust: 0.3

vendor:emcmodel:rsa bsafe micro edition suitescope:eqversion:4.0

Trust: 0.3

vendor:ibmmodel:rational policy testerscope:eqversion:8.5

Trust: 0.3

vendor:emcmodel:rsa bsafe micro edition suitescope:eqversion:3.2

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.19

Trust: 0.3

vendor:opensslmodel:project openssl beta5scope:eqversion:1.0.0

Trust: 0.3

vendor:microsoftmodel:windows server enterprise editionscope:eqversion:2003

Trust: 0.3

vendor:microsoftmodel:windows server enterprise edition itanium sp2scope:eqversion:2003

Trust: 0.3

vendor:microsoftmodel:windows server gold enterprisescope:eqversion:2003

Trust: 0.3

vendor:microsoftmodel:windows vista sp2scope: - version: -

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.6

Trust: 0.3

vendor:ibmmodel:websphere datapower soa appliancescope:eqversion:3.8.1

Trust: 0.3

vendor:oraclemodel:jrockit r27.1.0scope: - version: -

Trust: 0.3

vendor:opensslmodel:project openssl ascope:eqversion:0.9.7

Trust: 0.3

vendor:oraclemodel:fusion middleware 11g releasescope:eqversion:111.1.16

Trust: 0.3

vendor:microsoftmodel:windows vista business 64-bit editionscope:eqversion:0

Trust: 0.3

vendor:danielmodel:stenberg curlscope:eqversion:7.23.1

Trust: 0.3

vendor:ibmmodel:websphere multichannel bank transformation toolkitscope:eqversion:8.1

Trust: 0.3

vendor:emcmodel:vplex geosynchronyscope:eqversion:5.2.1

Trust: 0.3

vendor:operamodel:software opera web browser bscope:eqversion:7.11

Trust: 0.3

vendor:redhatmodel:enterprise linux supplementary serverscope:eqversion:5

Trust: 0.3

vendor:avayamodel:voice portalscope:eqversion:5.1

Trust: 0.3

vendor:oraclemodel:jrockit r28.1.4scope: - version: -

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.2.9.1

Trust: 0.3

vendor:avayamodel:aura sip enablement servicesscope:eqversion:5.1

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:6.1.0-103

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.1.12.201

Trust: 0.3

vendor:microsoftmodel:windows xp media center edition sp3scope: - version: -

Trust: 0.3

vendor:ibmmodel:power systemsscope:eqversion:740.16

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9.01

Trust: 0.3

vendor:ibmmodel:rational appscan standardscope:eqversion:8.0.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.12

Trust: 0.3

vendor:redhatmodel:enterprise linux workstationscope:eqversion:6

Trust: 0.3

vendor:hpmodel:nonstop server j06.09.00scope: - version: -

Trust: 0.3

vendor:microsoftmodel:windows server enterprise edition sp2scope:eqversion:2003x64

Trust: 0.3

vendor:redhatmodel:enterprise linux desktop clientscope:eqversion:5

Trust: 0.3

vendor:oraclemodel:jrockit r27.6.6scope: - version: -

Trust: 0.3

vendor:hpmodel:nonstop server j06.06.00scope: - version: -

Trust: 0.3

vendor:opensslmodel:project openssl 0.9.8qscope: - version: -

Trust: 0.3

vendor:microsoftmodel:windows xp media center editionscope: - version: -

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.7.4

Trust: 0.3

vendor:sunmodel:jdk updatescope:eqversion:1.6.012

Trust: 0.3

vendor:operamodel:software opera web browser beta2scope:eqversion:10.00

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.17

Trust: 0.3

vendor:danielmodel:stenberg curlscope:eqversion:7.15.3

Trust: 0.3

vendor:ibmmodel:power systemsscope:eqversion:760.11

Trust: 0.3

vendor:avayamodel:aura presence servicesscope:eqversion:6.1

Trust: 0.3

vendor:ibmmodel:lotus dominoscope:eqversion:8.5.2

Trust: 0.3

vendor:ibmmodel:bladecenter advanced management modulescope:eqversion:0

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.1.2.127

Trust: 0.3

vendor:ibmmodel:java sdk sr13 fp11scope:neversion:1.4.2

Trust: 0.3

vendor:ibmmodel:power systemsscope:eqversion:740.50

Trust: 0.3

vendor:avayamodel:cms serverscope:eqversion:16.0

Trust: 0.3

vendor:microsoftmodel:windows server gold storagescope:eqversion:2003

Trust: 0.3

vendor:oraclemodel:jrockit r27.6.8scope: - version: -

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9.02

Trust: 0.3

vendor:microsoftmodel:windows xp modescope:eqversion:70

Trust: 0.3

vendor:operamodel:software opera web browser win32scope:eqversion:7.0

Trust: 0.3

vendor:microsoftmodel:windows vista home premium sp2scope: - version: -

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.310

Trust: 0.3

vendor:hitachimodel:cosminexus developer's kit for java (windows(x6scope:neversion:09-00-06

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:10.62

Trust: 0.3

vendor:hitachimodel:web server hp-uxscope:eqversion:04-10-01

Trust: 0.3

vendor:operamodel:software opera web browser win32scope:eqversion:6.0.1

Trust: 0.3

vendor:microsoftmodel:windows server r2 sp1scope:eqversion:2008x64

Trust: 0.3

vendor:avayamodel:callpilotscope:eqversion:4.0

Trust: 0.3

vendor:opensslmodel:project openssl 0.9.8gscope: - version: -

Trust: 0.3

vendor:susemodel:linux enterprise software development kit sp1 for sp2scope:eqversion:11

Trust: 0.3

vendor:avayamodel:voice portal sp1scope:eqversion:5.1

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:7.11

Trust: 0.3

vendor:microsoftmodel:windows vista home basic 64-bit edition sp1scope: - version: -

Trust: 0.3

vendor:hitachimodel:cosminexus studioscope:eqversion:0

Trust: 0.3

vendor:microsoftmodel:windows server standard edition sp2scope:eqversion:2008

Trust: 0.3

vendor:ibmmodel:java se sr12-fp5scope:eqversion:5.0

Trust: 0.3

vendor:openjdkmodel:openjdkscope:eqversion:6

Trust: 0.3

vendor:ubuntumodel:linux armscope:eqversion:10.04

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.202

Trust: 0.3

vendor:microsoftmodel:windows vista business sp1scope: - version: -

Trust: 0.3

vendor:microsoftmodel:windows server standard edition gold hpcscope:eqversion:2008-

Trust: 0.3

vendor:microsoftmodel:windows server gold x64-standardscope:eqversion:2003

Trust: 0.3

vendor:hitachimodel:web server windowsscope:eqversion:04-00-05

Trust: 0.3

vendor:sunmodel:jre betascope:eqversion:1.5.0

Trust: 0.3

vendor:operamodel:software opera web browser win32scope:eqversion:5.10

Trust: 0.3

vendor:ibmmodel:java sdkscope:eqversion:1.4.2

Trust: 0.3

vendor:danielmodel:stenberg curlscope:eqversion:7.15.5

Trust: 0.3

vendor:ibmmodel:power systemsscope:eqversion:350.30

Trust: 0.3

vendor:oraclemodel:jrockit r27.6.4scope: - version: -

Trust: 0.3

vendor:avayamodel:ip office application serverscope:eqversion:6.0

Trust: 0.3

vendor:avayamodel:aura system manager sp2scope:eqversion:6.1

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:7.1.1

Trust: 0.3

vendor:avayamodel:messaging storage server sp3scope:eqversion:5.2

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:14.0.835.186

Trust: 0.3

vendor:microsoftmodel:windows server sp2 storagescope:eqversion:2003

Trust: 0.3

vendor:sunmodel:jdk updatescope:eqversion:1.6.015

Trust: 0.3

vendor:microsoftmodel:windows vista enterprise sp1scope: - version: -

Trust: 0.3

vendor:hitachimodel:cosminexus application serverscope:eqversion:5.0

Trust: 0.3

vendor:avayamodel:message networkingscope:eqversion:5.2

Trust: 0.3

vendor:mandrivamodel:linux mandrakescope:eqversion:2010.1

Trust: 0.3

vendor:sunmodel:sdkscope:eqversion:1.4.219

Trust: 0.3

vendor:ibmmodel:java se sr10scope:neversion:6

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:9.0.597.94

Trust: 0.3

vendor:hitachimodel:cosminexus http serverscope:eqversion:09-00-10

Trust: 0.3

vendor:hpmodel:nonstop server h06.20.03scope: - version: -

Trust: 0.3

vendor:avayamodel:proactive contactscope:eqversion:4.2

Trust: 0.3

vendor:avayamodel:aura system platformscope:eqversion:1.0

Trust: 0.3

vendor:ibmmodel:java se sr11scope:eqversion:5.0

Trust: 0.3

vendor:microsoftmodel:windows server standard editionscope:eqversion:2008x64

Trust: 0.3

vendor:ibmmodel:power systemsscope:eqversion:770.10

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:7.2

Trust: 0.3

vendor:ibmmodel:power systemsscope:eqversion:730.80

Trust: 0.3

vendor:hitachimodel:ucosminexus service platform hp-uxscope:eqversion:09-00

Trust: 0.3

vendor:xeroxmodel:freeflow print server 73.c5.11scope: - version: -

Trust: 0.3

vendor:emcmodel:rsa bsafe ssl-jscope:neversion:6.0.1

Trust: 0.3

vendor:ibmmodel:power systemsscope:eqversion:730.50

Trust: 0.3

vendor:oraclemodel:enterprise linuxscope:eqversion:5

Trust: 0.3

vendor:hitachimodel:web server windowsscope:eqversion:03-00

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:8.02

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9.52

Trust: 0.3

vendor:microsoftmodel:windows xp tablet pc editionscope: - version: -

Trust: 0.3

vendor:microsoftmodel:windows professionalscope:eqversion:70

Trust: 0.3

vendor:hitachimodel:ucosminexus developer )scope:eqversion:09-00

Trust: 0.3

vendor:avayamodel:meeting exchangescope:eqversion:5.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:10.0.648.204

Trust: 0.3

vendor:opensslmodel:project opensslscope:eqversion:0.9.8

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.551.0

Trust: 0.3

vendor:ietfmodel:tlsscope:eqversion:1.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.301

Trust: 0.3

vendor:redhatmodel:enterprise linux workstation optionalscope:eqversion:6

Trust: 0.3

vendor:ibmmodel:power systemsscope:eqversion:730.90

Trust: 0.3

vendor:ibmmodel:power systemsscope:eqversion:730.00

Trust: 0.3

vendor:emcmodel:rsa bsafe ssl-jscope:neversion:5.1.2

Trust: 0.3

vendor:opensslmodel:project opensslscope:eqversion:0.9.4

Trust: 0.3

vendor:sunmodel:jdk update23scope:eqversion:1.5.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:12.0.742.112

Trust: 0.3

vendor:susemodel:linux enterprise server sp1scope:eqversion:11

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.3

Trust: 0.3

vendor:sunmodel:jdk updatescope:eqversion:1.6.03

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:8.0.2

Trust: 0.3

vendor:ubuntumodel:linux armscope:eqversion:10.10

Trust: 0.3

vendor:danielmodel:stenberg curlscope:eqversion:7.10.7

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.6

Trust: 0.3

vendor:ibmmodel:power systemsscope:eqversion:740.51

Trust: 0.3

vendor:sunmodel:jre 28scope:eqversion:1.4.2

Trust: 0.3

vendor:hpmodel:system management homepage bscope:eqversion:2.1.10.186

Trust: 0.3

vendor:mozillamodel:firefox betascope:eqversion:3.62

Trust: 0.3

vendor:opensslmodel:project openssl dscope:eqversion:0.9.8

Trust: 0.3

vendor:microsoftmodel:windows server itanium sp1scope:eqversion:2003

Trust: 0.3

vendor:microsoftmodel:windows server sp2scope:eqversion:2003

Trust: 0.3

vendor:keriomodel:controlscope:eqversion:7.1.0

Trust: 0.3

vendor:microsoftmodel:windows server datacenter editionscope:eqversion:20080

Trust: 0.3

vendor:hitachimodel:web server )scope:eqversion:02-04

Trust: 0.3

vendor:hitachimodel:cosminexus http server linuxscope:neversion:09-00-12

Trust: 0.3

vendor:applemodel:mac os serverscope:neversion:x10.7.4

Trust: 0.3

vendor:ibmmodel:flex system cmmscope:eqversion:1.00

Trust: 0.3

vendor:emcmodel:rsa bsafe micro edition suitescope:eqversion:4.0.3

Trust: 0.3

vendor:opensslmodel:project openssl 1.0.0bscope: - version: -

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:7.52

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:11.01

Trust: 0.3

vendor:hitachimodel:ucosminexus developer standardscope:eqversion:0

Trust: 0.3

vendor:hitachimodel:web server 01-02-/dscope: - version: -

Trust: 0.3

vendor:oraclemodel:http server 12cscope:eqversion:12.1.2

Trust: 0.3

vendor:microsoftmodel:windows server r2 x64-enterprisescope:eqversion:2003

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.1.11

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:7.1.2

Trust: 0.3

vendor:microsoftmodel:windows server goldscope:eqversion:2003x64

Trust: 0.3

vendor:avayamodel:aura system manager sp1scope:eqversion:6.1

Trust: 0.3

vendor:avayamodel:aura communication managerscope:eqversion:4.0

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.1.4.143

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.15

Trust: 0.3

vendor:opensslmodel:project openssl fscope:eqversion:0.9.8

Trust: 0.3

vendor:sunmodel:java system application serverscope:eqversion:8.1

Trust: 0.3

vendor:microsoftmodel:windows xp embedded sp3scope: - version: -

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9.60

Trust: 0.3

vendor:microsoftmodel:windows vista ultimate 64-bit edition sp1scope: - version: -

Trust: 0.3

vendor:microsoftmodel:windows server datacenter edition release candidatescope:eqversion:2008

Trust: 0.3

vendor:sunmodel:jdk 0 09scope:eqversion:1.5

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:6.2.0-12

Trust: 0.3

vendor:microsoftmodel:windows server r2 enterprise editionscope:eqversion:20080

Trust: 0.3

vendor:hitachimodel:hirdb for javascope:eqversion:0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.7

Trust: 0.3

vendor:vmwaremodel:vcenterscope:eqversion:4.1

Trust: 0.3

vendor:avayamodel:proactive contactscope:eqversion:5.0

Trust: 0.3

vendor:sunmodel:jre 04scope:eqversion:1.4.1

Trust: 0.3

vendor:microsoftmodel:windows xp professionalscope: - version: -

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.20

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.300

Trust: 0.3

vendor:sunmodel:jdk updatescope:eqversion:1.6.021

Trust: 0.3

vendor:ibmmodel:rational policy testerscope:eqversion:8.0

Trust: 0.3

vendor:operamodel:software opera web browser betascope:eqversion:9.50

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:10.51

Trust: 0.3

vendor:redhatmodel:enterprise linux server optionalscope:eqversion:6

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.1.5.146

Trust: 0.3

vendor:hpmodel:nonstop server j06.04.01scope: - version: -

Trust: 0.3

vendor:operamodel:software opera web browser win32scope:eqversion:6.0.3

Trust: 0.3

vendor:microsoftmodel:windows home premiumscope:eqversion:70

Trust: 0.3

vendor:ibmmodel:power systemsscope:eqversion:730.46

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:6.1.2

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.2

Trust: 0.3

vendor:microsoftmodel:windows vista sp1scope: - version: -

Trust: 0.3

vendor:hitachimodel:ucosminexus primary server basescope:eqversion:0

Trust: 0.3

vendor:danielmodel:stenberg curlscope:eqversion:7.15.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.4

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.7.5

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9.22

Trust: 0.3

vendor:microsoftmodel:windows server r2 enterprise edition sp1scope:eqversion:20030

Trust: 0.3

vendor:opensslmodel:project openssl mscope:eqversion:0.9.7

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.205

Trust: 0.3

vendor:microsoftmodel:windows xp media center edition sp2scope: - version: -

Trust: 0.3

vendor:microsoftmodel:windows starterscope:eqversion:70

Trust: 0.3

vendor:sunmodel:jdk updatescope:eqversion:1.6.07

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.204

Trust: 0.3

vendor:hitachimodel:cosminexus http server hp-uxscope:neversion:09-00-13

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:11.10

Trust: 0.3

vendor:ibmmodel:lotus dominoscope:eqversion:8.0

Trust: 0.3

vendor:sunmodel:jdk update25scope:eqversion:1.5.0

Trust: 0.3

vendor:ibmmodel:lotus dominoscope:eqversion:8.5.1

Trust: 0.3

vendor:ibmmodel:java se sr13-fp11scope:neversion:1.4.2

Trust: 0.3

vendor:opensslmodel:project openssl jscope:eqversion:0.9.7

Trust: 0.3

vendor:microsoftmodel:windows server sp2 datacenterscope:eqversion:2003

Trust: 0.3

vendor:microsoftmodel:windows server standard edition gold standardscope:eqversion:2008-

Trust: 0.3

vendor:microsoftmodel:windows vista home basic sp2scope: - version: -

Trust: 0.3

vendor:avayamodel:voice portalscope:eqversion:4.0

Trust: 0.3

vendor:avayamodel:aura system platform sp3scope:eqversion:6.0

Trust: 0.3

vendor:avayamodel:aura sip enablement servicesscope:eqversion:4.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.103

Trust: 0.3

vendor:microsoftmodel:windows server standard edition sp2 storagescope:eqversion:2008-

Trust: 0.3

vendor:sunmodel:jdk 1.6.0 01-b06scope: - version: -

Trust: 0.3

vendor:danielmodel:stenberg curlscope:eqversion:7.18.1

Trust: 0.3

vendor:hitachimodel:web server 02-04-/cscope: - version: -

Trust: 0.3

vendor:hitachimodel:cosminexus developer lightscope:eqversion:0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.696.71

Trust: 0.3

vendor:hitachimodel:ucosminexus clientscope:eqversion:0

Trust: 0.3

vendor:microsoftmodel:windows server standard edition r2 sp1scope:eqversion:2008

Trust: 0.3

vendor:avayamodel:meeting exchange webportalscope:eqversion:-6.0

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:5.2.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:12.0.742.91

Trust: 0.3

vendor:operamodel:software opera web browser betascope:eqversion:9.601

Trust: 0.3

vendor:avayamodel:aura communication manager utility servicesscope:eqversion:6.0

Trust: 0.3

vendor:hitachimodel:web server solarisscope:eqversion:03-00

Trust: 0.3

vendor:sunmodel:jdk updatescope:eqversion:1.6.017

Trust: 0.3

vendor:microsoftmodel:windows server r2 compute clusterscope:eqversion:2003

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.210

Trust: 0.3

vendor:gentoomodel:linuxscope: - version: -

Trust: 0.3

vendor:hitachimodel:web server hp-uxscope:eqversion:03-00-01

Trust: 0.3

vendor:sunmodel:jdk 1.5.0.0 03scope: - version: -

Trust: 0.3

vendor:microsoftmodel:windows vista ultimate sp1scope: - version: -

Trust: 0.3

vendor:sunmodel:sdkscope:eqversion:1.4.227

Trust: 0.3

vendor:opensslmodel:project openssl kscope:eqversion:0.9.6

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.309

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.214

Trust: 0.3

vendor:danielmodel:stenberg curlscope:eqversion:7.19.4

Trust: 0.3

vendor:sunmodel:sdkscope:eqversion:1.4.224

Trust: 0.3

vendor:hitachimodel:ucosminexus service platform linuxscope:eqversion:09-00(x64)

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.1.9

Trust: 0.3

vendor:sunmodel:solarisscope:eqversion:10

Trust: 0.3

vendor:danielmodel:stenberg curlscope:eqversion:7.11

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.7

Trust: 0.3

vendor:microsoftmodel:windows server standard edition gold storagescope:eqversion:2008-

Trust: 0.3

vendor:microsoftmodel:windows for x64-based systemsscope:eqversion:70

Trust: 0.3

vendor:ibmmodel:power systemsscope:eqversion:740.52

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:10.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.8

Trust: 0.3

vendor:hpmodel:nonstop server h06.20.02scope: - version: -

Trust: 0.3

vendor:hitachimodel:cosminexus developer no versionscope:eqversion:0

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.1

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.1.0.121

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:14.0.835.163

Trust: 0.3

vendor:sunmodel:jdk update18scope:eqversion:1.5.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.304

Trust: 0.3

vendor:microsoftmodel:windows vista enterprise sp2scope: - version: -

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.11

Trust: 0.3

vendor:hpmodel:nonstop server j06.09.02scope: - version: -

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.305

Trust: 0.3

vendor:microsoftmodel:windows xp professional sp2scope: - version: -

Trust: 0.3

vendor:ibmmodel:power systemsscope:eqversion:730.60

Trust: 0.3

vendor:microsoftmodel:windows server r2 datacenter edition sp1scope:eqversion:20030

Trust: 0.3

vendor:avayamodel:iqscope:eqversion:5.1

Trust: 0.3

vendor:applemodel:tvscope:eqversion:4.0

Trust: 0.3

vendor:danielmodel:stenberg curlscope:eqversion:7.13.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.16

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:7.50

Trust: 0.3

vendor:emcmodel:rsa bsafe micro edition suitescope:eqversion:3.2.4

Trust: 0.3

vendor:hpmodel:nonstop server h06.18.01scope: - version: -

Trust: 0.3

vendor:hitachimodel:cosminexus application server no versionscope:eqversion:0

Trust: 0.3

vendor:ibmmodel:websphere datapower soa appliancescope:eqversion:4.0.1

Trust: 0.3

vendor:ibmmodel:power systemsscope:eqversion:770.00

Trust: 0.3

vendor:danielmodel:stenberg curlscope:neversion:7.24.0

Trust: 0.3

vendor:microsoftmodel:windows server r2 datacenterscope:eqversion:20080

Trust: 0.3

vendor:microsoftmodel:windows vista home basic 64-bit edition sp1scope:eqversion:x64

Trust: 0.3

vendor:ibmmodel:power systemsscope:eqversion:760.10

Trust: 0.3

vendor:opensslmodel:project openssl 0.9.8fscope: - version: -

Trust: 0.3

vendor:ibmmodel:power systemsscope:eqversion:350.50

Trust: 0.3

vendor:susemodel:linux enterprise sdk sp1scope:eqversion:11

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:4.0.1

Trust: 0.3

vendor:microsoftmodel:windows vista enterprise 64-bit edition sp2scope: - version: -

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.203

Trust: 0.3

vendor:avayamodel:proactive contactscope:eqversion:4.1.1

Trust: 0.3

vendor:hpmodel:nonstop server h06.19.00scope: - version: -

Trust: 0.3

vendor:microsoftmodel:windows server enterprise edition itaniumscope:eqversion:20030

Trust: 0.3

vendor:microsoftmodel:windows vista home basicscope: - version: -

Trust: 0.3

vendor:microsoftmodel:windows vista business 64-bit edition sp1 x86-ultimatescope: - version: -

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.7

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:6.1

Trust: 0.3

vendor:hitachimodel:web server aixscope:eqversion:04-00

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.0.1

Trust: 0.3

vendor:xeroxmodel:freeflow print server 81.d0.73scope: - version: -

Trust: 0.3

vendor:avayamodel:meeting exchange sp1scope:eqversion:5.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.208

Trust: 0.3

vendor:opensslmodel:project openssl bscope:eqversion:0.9.7

Trust: 0.3

vendor:microsoftmodel:windows server enterprise edition itanium sp1scope:eqversion:2003

Trust: 0.3

vendor:operamodel:software opera web browser beta3scope:eqversion:10.00

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:10.04

Trust: 0.3

vendor:microsoftmodel:windows server standard edition sp1 betascope:eqversion:20031

Trust: 0.3

vendor:hpmodel:nonstop server j06.06.02scope: - version: -

Trust: 0.3

vendor:avayamodel:cms serverscope:eqversion:15.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.12

Trust: 0.3

vendor:oraclemodel:jrockit r27.6.2scope: - version: -

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:6.1.3

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:3.0.2-77

Trust: 0.3

vendor:hitachimodel:ucosminexus application server expressscope:eqversion:09-70

Trust: 0.3

vendor:avayamodel:messaging storage serverscope:eqversion:5.2.8

Trust: 0.3

vendor:hitachimodel:web serverscope:eqversion:03-00-01

Trust: 0.3

vendor:avayamodel:aura system platform sp2scope:eqversion:6.0

Trust: 0.3

vendor:hpmodel:system management homepagescope:neversion:7.2.1

Trust: 0.3

vendor:siemensmodel:simatic rf615rscope:neversion:3.2.1

Trust: 0.3

vendor:microsoftmodel:windows vista edition sp1scope:eqversion:x64

Trust: 0.3

vendor:microsoftmodel:windows server gold itaniumscope:eqversion:2003

Trust: 0.3

vendor:microsoftmodel:windows server datacenter editionscope:eqversion:2003

Trust: 0.3

vendor:sunmodel:jre 27scope:eqversion:1.4.2

Trust: 0.3

vendor:ibmmodel:rational appscan standardscope:eqversion:8.0.0.3

Trust: 0.3

vendor:microsoftmodel:windows vista business 64-bit edition sp1 x64-ultimatescope: - version: -

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.209

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.226

Trust: 0.3

vendor:microsoftmodel:windows server standard edition sp2scope:eqversion:2003

Trust: 0.3

vendor:sunmodel:jdk updatescope:eqversion:1.6.014

Trust: 0.3

vendor:hitachimodel:cosminexus application server enterprisescope:eqversion:0

Trust: 0.3

vendor:hpmodel:nonstop server j06.12.00scope: - version: -

Trust: 0.3

vendor:microsoftmodel:windows server enterprise edition sp2scope:eqversion:2008

Trust: 0.3

vendor:oraclemodel:jrockit r27.6.9scope: - version: -

Trust: 0.3

vendor:opensslmodel:project openssl 0.9.8rscope: - version: -

Trust: 0.3

vendor:microsoftmodel:windows server r2 storagescope:eqversion:2003

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.0

Trust: 0.3

vendor:ibmmodel:power systems 350.a0scope: - version: -

Trust: 0.3

vendor:siemensmodel:simatic rf68xrscope:eqversion:3.1

Trust: 0.3

vendor:sunmodel:jdk updatescope:eqversion:1.6.011

Trust: 0.3

vendor:microsoftmodel:windows vista business 64-bit edition sp1 x64-home premiumscope: - version: -

Trust: 0.3

vendor:hpmodel:nonstop server j06.09.01scope: - version: -

Trust: 0.3

vendor:oraclemodel:jrockit r27.6.3scope: - version: -

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.9

Trust: 0.3

vendor:sunmodel:jdk update14scope:eqversion:1.5.0

Trust: 0.3

vendor:hitachimodel:cosminexusscope:eqversion:8.0

Trust: 0.3

vendor:opensslmodel:project openssl beta4scope:eqversion:1.0.0

Trust: 0.3

vendor:ibmmodel:java se sr6scope:eqversion:6.0

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.0.1

Trust: 0.3

vendor:microsoftmodel:windows server standard edition gold enterprisescope:eqversion:2008-

Trust: 0.3

vendor:redhatmodel:enterprise linux desktopscope:eqversion:6

Trust: 0.3

vendor:applemodel:tvscope:eqversion:4.3

Trust: 0.3

vendor:avayamodel:meeting exchange sp1scope:eqversion:5.0

Trust: 0.3

vendor:opensslmodel:project openssl 0.9.8pscope: - version: -

Trust: 0.3

vendor:microsoftmodel:windows server standard editionscope:eqversion:2003x64

Trust: 0.3

vendor:emcmodel:rsa bsafe micro edition suitescope:eqversion:4.0.2

Trust: 0.3

vendor:hitachimodel:ucosminexus developerscope:eqversion:010

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.1.15-210

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9.27

Trust: 0.3

vendor:hitachimodel:ucosminexus service architectscope:eqversion:0

Trust: 0.3

vendor:avayamodel:messaging application serverscope:eqversion:5

Trust: 0.3

vendor:microsoftmodel:windows server r2 sp1scope:eqversion:2008

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:6.0.0.95

Trust: 0.3

vendor:microsoftmodel:windows xp tablet pc edition sp1scope: - version: -

Trust: 0.3

vendor:hitachimodel:ucosminexus service platform messagingscope:eqversion:-0

Trust: 0.3

vendor:avayamodel:voice portal sp2scope:eqversion:5.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.18

Trust: 0.3

vendor:peersecmodel:networks matrixsslscope:neversion:3.2.2

Trust: 0.3

vendor:microsoftmodel:windows server standard edition goldscope:eqversion:2008-

Trust: 0.3

vendor:microsoftmodel:windows server r2 platfom sdkscope:eqversion:2003

Trust: 0.3

vendor:microsoftmodel:windows vista ultimate sp2scope: - version: -

Trust: 0.3

vendor:hitachimodel:web serverscope:eqversion:03-00-02

Trust: 0.3

vendor:hpmodel:nonstop server j06.10.02scope: - version: -

Trust: 0.3

vendor:avayamodel:aura messagingscope:eqversion:6.0.1

Trust: 0.3

vendor:ietfmodel:secure sockets layerscope:eqversion:3.0

Trust: 0.3

vendor:microsoftmodel:windows ultimatescope:eqversion:70

Trust: 0.3

vendor:microsoftmodel:windows server standard edition sp1scope:eqversion:2003

Trust: 0.3

vendor:emcmodel:rsa bsafe micro edition suitescope:eqversion:3.2.5

Trust: 0.3

vendor:avayamodel:aura sip enablement servicesscope:eqversion:5.2

Trust: 0.3

vendor:hpmodel:nonstop server h06.24.01scope: - version: -

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:7.23

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:6.0

Trust: 0.3

vendor:opensslmodel:project openssl dscope:eqversion:0.9.7

Trust: 0.3

vendor:microsoftmodel:windows server r2 standardscope:eqversion:2003

Trust: 0.3

vendor:ibmmodel:power systemsscope:eqversion:740.60

Trust: 0.3

vendor:avayamodel:messaging storage server sp2scope:eqversion:5.2

Trust: 0.3

vendor:ibmmodel:websphere multichannel bank transformation toolkitscope:eqversion:8.1.0.2

Trust: 0.3

vendor:microsoftmodel:windows vista home basic 64-bit edition sp2scope: - version: -

Trust: 0.3

vendor:keriomodel:connect buildscope:eqversion:7.1.42985

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:10.10

Trust: 0.3

vendor:hitachimodel:web server 02-04-/a (windows(ipscope: - version: -

Trust: 0.3

vendor:danielmodel:stenberg curlscope:eqversion:7.19.6

Trust: 0.3

vendor:microsoftmodel:windows server datacenter edition itanium sp1 betascope:eqversion:20031

Trust: 0.3

vendor:microsoftmodel:windows server for x64-based systems sp2scope:eqversion:2008

Trust: 0.3

vendor:applemodel:mac osscope:neversion:x10.7.5

Trust: 0.3

vendor:vmwaremodel:virtualcenter update 6bscope:neversion:2.5

Trust: 0.3

vendor:opensslmodel:project openssl ascope:eqversion:0.9.6

Trust: 0.3

vendor:siemensmodel:simatic rf68xrscope:eqversion:3.2

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:11.04

Trust: 0.3

vendor:sunmodel:jre 1.5.0 09scope: - version: -

Trust: 0.3

vendor:opensslmodel:project openssl fscope:eqversion:0.9.7

Trust: 0.3

vendor:hitachimodel:cosminexus http server hp-uxscope:eqversion:09-00-10

Trust: 0.3

vendor:redhatmodel:enterprise linux ws extrasscope:eqversion:4

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.6.6

Trust: 0.3

vendor:microsoftmodel:windows xp homescope: - version: -

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9.10

Trust: 0.3

vendor:microsoftmodel:windows server web editionscope:eqversion:2003

Trust: 0.3

vendor:hpmodel:hp-ux b.11.11scope: - version: -

Trust: 0.3

vendor:operamodel:software opera web browser 3win32scope:eqversion:7.0

Trust: 0.3

vendor:redhatmodel:enterprise linux es extrasscope:eqversion:4

Trust: 0.3

vendor:openjdkmodel:openjdkscope:eqversion:1.6

Trust: 0.3

vendor:sunmodel:jdk updatescope:eqversion:1.6.010

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.1.8

Trust: 0.3

vendor:mozillamodel:firefox betascope:eqversion:3.63

Trust: 0.3

vendor:operamodel:software opera web browser 2win32scope:eqversion:7.0

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:3.0.64

Trust: 0.3

vendor:microsoftmodel:windows server itaniumscope:eqversion:20030

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:8.01

Trust: 0.3

vendor:microsoftmodel:windows xp service packscope:eqversion:30

Trust: 0.3

vendor:hpmodel:nonstop server j06.08.01scope: - version: -

Trust: 0.3

vendor:xeroxmodel:freeflow print server 82.d1.44scope: - version: -

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:6.1

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.2.8

Trust: 0.3

vendor:avayamodel:communication server telephony managerscope:eqversion:10003.0

Trust: 0.3

vendor:opensslmodel:project openssl 0.9.8lscope: - version: -

Trust: 0.3

vendor:hitachimodel:web server hp-uxscope:eqversion:03-10-09

Trust: 0.3

vendor:microsoftmodel:windows server r2 datacenterscope:eqversion:2003

Trust: 0.3

vendor:microsoftmodel:windows server sp2 compute clusterscope:eqversion:2003

Trust: 0.3

vendor:opensslmodel:project openssl hscope:eqversion:0.9.8

Trust: 0.3

vendor:hitachimodel:cosminexus developer's kit for javascope:neversion:09-50-01

Trust: 0.3

vendor:operamodel:software opera web browser win32scope:eqversion:6.0.4

Trust: 0.3

vendor:hpmodel:nonstop server h06.15.01scope: - version: -

Trust: 0.3

vendor:opensslmodel:project openssl iscope:eqversion:0.9.8

Trust: 0.3

vendor:hitachimodel:cosminexus primary server basescope:eqversion:0

Trust: 0.3

vendor:ibmmodel:power systemsscope:eqversion:740.21

Trust: 0.3

vendor:sunmodel:sdkscope:eqversion:1.4.223

Trust: 0.3

vendor:keriomodel:connectscope:neversion:8.1

Trust: 0.3

vendor:hitachimodel:web server hp-uxscope:eqversion:04-00-04

Trust: 0.3

vendor:hpmodel:nonstop server h06.23scope: - version: -

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:5.2.3

Trust: 0.3

vendor:mandrakesoftmodel:enterprise serverscope:eqversion:5

Trust: 0.3

vendor:siemensmodel:simatic rf615rscope:eqversion:3.1

Trust: 0.3

vendor:ibmmodel:java se sr7scope:eqversion:6.0

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:7.20

Trust: 0.3

vendor:ibmmodel:java se sr13-fp10scope:eqversion:1.4.2

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:10.63

Trust: 0.3

vendor:microsoftmodel:windows xp professional edition sp2scope:eqversion:x64

Trust: 0.3

vendor:mandrivamodel:business serverscope:eqversion:1x8664

Trust: 0.3

vendor:sunmodel:jdk update16scope:eqversion:1.5.0

Trust: 0.3

vendor:opensslmodel:project openssl cscope:eqversion:0.9.8

Trust: 0.3

vendor:microsoftmodel:windows home premium sp1scope:eqversion:7-x64

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.14

Trust: 0.3

vendor:hpmodel:nonstop server h06.22.01scope: - version: -

Trust: 0.3

vendor:collaxmodel:groupware suitescope:neversion:5.5.12

Trust: 0.3

vendor:microsoftmodel:windows xp professional sp3scope: - version: -

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.0.2.106

Trust: 0.3

vendor:oraclemodel:jrockit r28.1.3scope: - version: -

Trust: 0.3

vendor:sunmodel:sdk .0 01scope:eqversion:1.4

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.7.1

Trust: 0.3

vendor:microsoftmodel:windows vista home basic 64-bit edition sp2scope:eqversion:x64

Trust: 0.3

vendor:ibmmodel:lotus dominoscope:eqversion:8.5

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:5.12

Trust: 0.3

vendor:microsoftmodel:windows server enterprise edition release candidatescope:eqversion:2008

Trust: 0.3

vendor:sunmodel:jdk updatescope:eqversion:1.6.020

Trust: 0.3

vendor:redhatmodel:enterprise linux as for sapscope:eqversion:4

Trust: 0.3

vendor:avayamodel:message networkingscope:eqversion:5.2.1

Trust: 0.3

vendor:ibmmodel:flex system integrated management modulescope:eqversion:2

Trust: 0.3

vendor:hpmodel:nonstop server h06.19.03scope: - version: -

Trust: 0.3

vendor:ibmmodel:power systemsscope:eqversion:760.41

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.1.1

Trust: 0.3

vendor:danielmodel:stenberg curlscope:eqversion:7.12.2

Trust: 0.3

vendor:microsoftmodel:windows vista home basic 64-bit editionscope:eqversion:0

Trust: 0.3

vendor:sunmodel:jdk updatescope:eqversion:1.6.05

Trust: 0.3

vendor:hitachimodel:cosminexusscope:eqversion:7.0

Trust: 0.3

vendor:peersecmodel:networks matrixsslscope:eqversion:3.2.1

Trust: 0.3

vendor:ibmmodel:websphere multichannel bank transformation toolkitscope:eqversion:8.0

Trust: 0.3

vendor:avayamodel:interactive responsescope:eqversion:4.0

Trust: 0.3

vendor:microsoftmodel:windows for x64-based systems sp1scope:eqversion:7

Trust: 0.3

vendor:emcmodel:vplex geosynchronyscope:neversion:5.3

Trust: 0.3

vendor:avayamodel:messaging application serverscope:eqversion:5.2

Trust: 0.3

vendor:opensslmodel:project opensslscope:eqversion:0.9.5

Trust: 0.3

vendor:danielmodel:stenberg curlscope:eqversion:7.16.3

Trust: 0.3

vendor:microsoftmodel:windows server r2 itanium sp1scope:eqversion:2008

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:4.3

Trust: 0.3

vendor:ibmmodel:power systemsscope:eqversion:730.51

Trust: 0.3

vendor:hpmodel:nonstop server h06.21.02scope: - version: -

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:6.0

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.8

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.7.3

Trust: 0.3

vendor:operamodel:software opera web browser win32scope:eqversion:5.11

Trust: 0.3

vendor:hitachimodel:cosminexus clientscope:eqversion:0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.212

Trust: 0.3

vendor:hitachimodel:cosminexus http serverscope:eqversion:09-00

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.206

Trust: 0.3

vendor:avayamodel:cms server auxscope:eqversion:15.0

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:6.3

Trust: 0.3

vendor:hitachimodel:cosminexus http server windowsscope:neversion:09-00-12

Trust: 0.3

vendor:hpmodel:nonstop server h06.19.01scope: - version: -

Trust: 0.3

vendor:hitachimodel:web server windowsscope:eqversion:04-00

Trust: 0.3

vendor:xeroxmodel:freeflow print server 93.e0.21cscope: - version: -

Trust: 0.3

vendor:ibmmodel:power systemsscope:eqversion:350.10

Trust: 0.3

vendor:siemensmodel:simatic rf615rscope:eqversion:3.2

Trust: 0.3

vendor:avayamodel:proactive contactscope:eqversion:4.1.2

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:11.10

Trust: 0.3

vendor:applemodel:mac osscope:neversion:x10.9

Trust: 0.3

vendor:hitachimodel:cosminexus http server linuxscope:eqversion:09-00

Trust: 0.3

vendor:microsoftmodel:windows server r2 x64-standardscope:eqversion:2003

Trust: 0.3

vendor:hpmodel:nonstop server j06.11.00scope: - version: -

Trust: 0.3

vendor:hpmodel:nonstop server h06.26.01scope: - version: -

Trust: 0.3

vendor:debianmodel:linux armscope:eqversion:6.0

Trust: 0.3

vendor:avayamodel:aura presence servicesscope:eqversion:6.1.1

Trust: 0.3

vendor:susemodel:linux enterprise server sp1 for sp2scope:eqversion:11

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.696.43

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9.26

Trust: 0.3

vendor:operamodel:software opera web browser win32 betascope:eqversion:7.02

Trust: 0.3

vendor:novellmodel:access manager sp3scope:eqversion:3.1

Trust: 0.3

vendor:hitachimodel:ucosminexus developer hp-uxscope:eqversion:09-00

Trust: 0.3

vendor:ibmmodel:websphere datapower soa appliancescope:eqversion:3.8.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.221

Trust: 0.3

vendor:hpmodel:nonstop server j06.04.00scope: - version: -

Trust: 0.3

vendor:sunmodel:jdk updatescope:eqversion:1.6.016

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.307

Trust: 0.3

vendor:microsoftmodel:windows xpscope:eqversion:0

Trust: 0.3

vendor:sunmodel:jdk 1.5.0 07-b03scope: - version: -

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.1

Trust: 0.3

vendor:avayamodel:voice portalscope:eqversion:5.1.1

Trust: 0.3

vendor:microsoftmodel:windows server r2scope:eqversion:2008

Trust: 0.3

vendor:microsoftmodel:windows server datacenter edition itaniumscope:eqversion:20030

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:5.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.21

Trust: 0.3

vendor:operamodel:software opera web browser win32scope:eqversion:6.0.2

Trust: 0.3

vendor:vmwaremodel:update managerscope:eqversion:5.0

Trust: 0.3

vendor:danielmodel:stenberg curlscope:eqversion:7.12.1

Trust: 0.3

vendor:opensslmodel:project openssl escope:eqversion:0.9.8

Trust: 0.3

vendor:hitachimodel:ucosminexus service platformscope:eqversion:0

Trust: 0.3

vendor:hitachimodel:cosminexus http server linuxscope:eqversion:09-00-10

Trust: 0.3

vendor:operamodel:software opera web browser linuxscope:eqversion:5.0

Trust: 0.3

vendor:ibmmodel:power systemsscope:eqversion:350.40

Trust: 0.3

vendor:redhatmodel:enterprise linux sapscope:eqversion:6

Trust: 0.3

vendor:hpmodel:nonstop server h06.20.01scope: - version: -

Trust: 0.3

vendor:danielmodel:stenberg curlscope:eqversion:7.19.5

Trust: 0.3

vendor:operamodel:software opera web browser betascope:eqversion:9.201

Trust: 0.3

vendor:danielmodel:stenberg curlscope:eqversion:7.21.7

Trust: 0.3

vendor:hpmodel:nonstop server j06.10.00scope: - version: -

Trust: 0.3

vendor:ibmmodel:websphere multichannel bank transformation toolkitscope:eqversion:8.0.1

Trust: 0.3

vendor:hitachimodel:ucosminexus application server standard-rscope:eqversion:0

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9.21

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.550.0

Trust: 0.3

vendor:microsoftmodel:windows vista enterprisescope: - version: -

Trust: 0.3

vendor:hitachimodel:ucosminexus service platform windowsscope:eqversion:09-00(x64)

Trust: 0.3

vendor:hpmodel:nonstop server h06.16.02scope: - version: -

Trust: 0.3

vendor:operamodel:software opera web browser linuxscope:eqversion:6.0.2

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.1.3

Trust: 0.3

vendor:avayamodel:voice portalscope:eqversion:4.1

Trust: 0.3

vendor:microsoftmodel:windows server sp2 enterprisescope:eqversion:2003

Trust: 0.3

vendor:ubuntumodel:linux armscope:eqversion:11.04

Trust: 0.3

vendor:sunmodel:jdk update22scope:eqversion:1.5.0

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:10.61

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:10

Trust: 0.3

vendor:ibmmodel:power systemsscope:eqversion:760.20

Trust: 0.3

vendor:microsoftmodel:windows xp media center edition sp1scope: - version: -

Trust: 0.3

vendor:sunmodel:jdk update15scope:eqversion:1.5.0

Trust: 0.3

vendor:opensslmodel:project openssl beta1scope:eqversion:0.9.7

Trust: 0.3

vendor:avayamodel:communication server telephony managerscope:eqversion:10004.0

Trust: 0.3

vendor:applemodel:mac osscope:neversion:x10.8.2

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.0.2

Trust: 0.3

vendor:ibmmodel:power systemsscope:eqversion:730.91

Trust: 0.3

vendor:applemodel:xcodescope:neversion:4.4

Trust: 0.3

vendor:xeroxmodel:freeflow print server 73.d2.33scope: - version: -

Trust: 0.3

vendor:opensslmodel:project openssl mscope:eqversion:0.9.6

Trust: 0.3

vendor:oraclemodel:database 11g releasescope:eqversion:111.1.0.7

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:10.0.648.205

Trust: 0.3

vendor:opensslmodel:project openssl bscope:eqversion:0.9.2

Trust: 0.3

vendor:microsoftmodel:windows server datacenter edition sp1scope:eqversion:2003

Trust: 0.3

vendor:avayamodel:messaging storage serverscope:eqversion:5.2.2

Trust: 0.3

vendor:hpmodel:nonstop server h06.25.01scope: - version: -

Trust: 0.3

vendor:opensslmodel:project openssl jscope:eqversion:0.9.6

Trust: 0.3

vendor:microsoftmodel:windows server web edition sp1 betascope:eqversion:20031

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.7.2

Trust: 0.3

sources: CERT/CC: VU#864643 // BID: 49778 // NVD: CVE-2011-3389

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2011-3389
value: MEDIUM

Trust: 1.0

CARNEGIE MELLON: VU#864643
value: 3.38

Trust: 0.8

VULMON: CVE-2011-3389
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2011-3389
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

sources: CERT/CC: VU#864643 // VULMON: CVE-2011-3389 // NVD: CVE-2011-3389

PROBLEMTYPE DATA

problemtype:CWE-326

Trust: 1.0

sources: NVD: CVE-2011-3389

THREAT TYPE

network

Trust: 0.3

sources: BID: 49778

TYPE

Design Error

Trust: 0.3

sources: BID: 49778

PATCH

title:Debian CVElist Bug Report Logs: CVE-2011-4362: DoS because of incorrect code in src/http_auth.c:67url:https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=210cf4b6236578faf8f94374acf42746

Trust: 0.1

title:Debian CVElist Bug Report Logs: nss: CVE-2014-1569 information leakurl:https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=ab91355beed7b295ca76667e7725b8ff

Trust: 0.1

title:Red Hat: Critical: java-1.4.2-ibm security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20120006 - Security Advisory

Trust: 0.1

title:Debian Security Advisories: DSA-2398-2 curl -- several vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=aedc7511d582d3d92a5ba7329ed7d34e

Trust: 0.1

title:Red Hat: Moderate: java-1.4.2-ibm-sap security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20120343 - Security Advisory

Trust: 0.1

title:Debian Security Advisories: DSA-2368-1 lighttpd -- multiple vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=013e897d92ab510d8719f5ffc2cb7e80

Trust: 0.1

title:Siemens Security Advisories: Siemens Security Advisoryurl:https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories&qid=43a9f1e298f8daf772ebfe7187e61853

Trust: 0.1

title:Debian CVElist Bug Report Logs: asterisk: CVE-2015-3008: TLS Certificate Common name NULL byte exploiturl:https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=3dcc7cafafedb5ec8b84970acf17457b

Trust: 0.1

title:Red Hat: Critical: java-1.6.0-ibm security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20120034 - Security Advisory

Trust: 0.1

title:Debian CVElist Bug Report Logs: asterisk: chan_sip: File descriptors leak (UDP sockets) / AST-2016-007, CVE-2016-7551url:https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=84da1980846b47c2025a829646fab2ad

Trust: 0.1

title:Red Hat: Critical: thunderbird security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20121089 - Security Advisory

Trust: 0.1

title:Ubuntu Security Notice: openjdk-6, openjdk-6b18 regressionurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-1263-2

Trust: 0.1

title:Red Hat: Critical: firefox security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20121088 - Security Advisory

Trust: 0.1

title:Ubuntu Security Notice: icedtea-web, openjdk-6, openjdk-6b18 vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-1263-1

Trust: 0.1

title:Debian Security Advisories: DSA-2356-1 openjdk-6 -- several vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=a48d7ee302b835c97c950b74a371fcfe

Trust: 0.1

title:Amazon Linux AMI: ALAS-2011-010url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2011-010

Trust: 0.1

title:IBM: IBM Security Bulletin: IBM Cognos Controller 2019Q2 Security Updater: Multiple vulnerabilities have been identified in IBM Cognos Controllerurl:https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=38227211accce022b0a3d9b56a974186

Trust: 0.1

title:Oracle: Oracle Critical Patch Update Advisory - July 2015url:https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=459961024c4bdce7bb3a1a40a65a6f2e

Trust: 0.1

title:Oracle: Oracle Critical Patch Update Advisory - January 2015url:https://vulmon.com/vendoradvisory?qidtp=oracle_advisories&qid=4a692d6d60aa31507cb101702b494c51

Trust: 0.1

title:Red Hat: Low: Red Hat Network Satellite server IBM Java Runtime security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20131455 - Security Advisory

Trust: 0.1

title:litecoin_demourl:https://github.com/swod00/litecoin_demo

Trust: 0.1

title:litecoinurl:https://github.com/daniel1302/litecoin

Trust: 0.1

title:regurl:https://github.com/genuinetools/reg

Trust: 0.1

title:testssl-reporturl:https://github.com/tzaffi/testssl-report

Trust: 0.1

title: - url:https://github.com/ricardobranco777/regview

Trust: 0.1

title: - url:https://github.com/Valdem88/dev-17_ib-yakovlev_vs

Trust: 0.1

sources: VULMON: CVE-2011-3389

EXTERNAL IDS

db:CERT/CCid:VU#864643

Trust: 2.1

db:NVDid:CVE-2011-3389

Trust: 1.9

db:SIEMENSid:SSA-556833

Trust: 1.3

db:BIDid:49778

Trust: 1.3

db:SECUNIAid:45791

Trust: 1.0

db:SECUNIAid:55350

Trust: 1.0

db:SECUNIAid:48256

Trust: 1.0

db:SECUNIAid:47998

Trust: 1.0

db:SECUNIAid:48915

Trust: 1.0

db:SECUNIAid:55351

Trust: 1.0

db:SECUNIAid:49198

Trust: 1.0

db:SECUNIAid:55322

Trust: 1.0

db:SECUNIAid:48948

Trust: 1.0

db:SECUNIAid:48692

Trust: 1.0

db:OSVDBid:74829

Trust: 1.0

db:SECTRACKid:1026103

Trust: 1.0

db:SECTRACKid:1029190

Trust: 1.0

db:SECTRACKid:1026704

Trust: 1.0

db:SECTRACKid:1025997

Trust: 1.0

db:BIDid:49388

Trust: 1.0

db:USCERTid:TA12-010A

Trust: 1.0

db:ICS CERTid:ICSMA-18-058-02

Trust: 1.0

db:HITACHIid:HS11-024

Trust: 0.4

db:HITACHIid:HS14-011

Trust: 0.3

db:HITACHIid:HS13-018

Trust: 0.3

db:ICS CERTid:ICSA-19-192-04

Trust: 0.3

db:XFid:70069

Trust: 0.3

db:SECUNIAid:46694

Trust: 0.2

db:VULMONid:CVE-2011-3389

Trust: 0.1

db:PACKETSTORMid:106747

Trust: 0.1

db:PACKETSTORMid:127267

Trust: 0.1

db:PACKETSTORMid:115046

Trust: 0.1

db:PACKETSTORMid:119293

Trust: 0.1

db:PACKETSTORMid:111633

Trust: 0.1

db:PACKETSTORMid:111851

Trust: 0.1

sources: CERT/CC: VU#864643 // VULMON: CVE-2011-3389 // BID: 49778 // PACKETSTORM: 106747 // PACKETSTORM: 127267 // PACKETSTORM: 115046 // PACKETSTORM: 119293 // PACKETSTORM: 111633 // PACKETSTORM: 111851 // NVD: CVE-2011-3389

REFERENCES

url:http://blogs.technet.com/b/msrc/archive/2011/09/26/microsoft-releases-security-advisory-2588513.aspx

Trust: 2.1

url:http://www.imperialviolet.org/2011/09/23/chromeandbeast.html

Trust: 1.8

url:http://vnhacker.blogspot.com/2011/09/beast.html

Trust: 1.8

url:http://blogs.technet.com/b/srd/archive/2011/09/26/is-ssl-broken-more-about-security-advisory-2588513.aspx

Trust: 1.8

url:http://www.educatedguesswork.org/2011/09/security_impact_of_the_rizzodu.html

Trust: 1.8

url:http://www.ibm.com/developerworks/java/jdk/alerts/

Trust: 1.6

url:https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c03839862

Trust: 1.6

url:http://curl.haxx.se/docs/adv_20120124b.html

Trust: 1.4

url:http://www.opera.com/docs/changelogs/windows/1160/

Trust: 1.3

url:http://www.opera.com/support/kb/view/1004/

Trust: 1.3

url:http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html

Trust: 1.3

url:http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html

Trust: 1.3

url:https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf

Trust: 1.3

url:http://www.kb.cert.org/vuls/id/864643

Trust: 1.3

url:https://bugzilla.mozilla.org/show_bug.cgi?id=665814

Trust: 1.1

url:http://security.gentoo.org/glsa/glsa-201406-32.xml

Trust: 1.1

url:http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html

Trust: 1.0

url:https://bugzilla.novell.com/show_bug.cgi?id=719047

Trust: 1.0

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a14752

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=133728004526190&w=2

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html

Trust: 1.0

url:https://bugzilla.redhat.com/show_bug.cgi?id=737506

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=132750579901589&w=2

Trust: 1.0

url:http://lists.apple.com/archives/security-announce/2012/may/msg00001.html

Trust: 1.0

url:http://ekoparty.org/2011/juliano-rizzo.php

Trust: 1.0

url:http://secunia.com/advisories/47998

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=134254866602253&w=2

Trust: 1.0

url:http://secunia.com/advisories/55351

Trust: 1.0

url:http://lists.apple.com/archives/security-announce/2011//oct/msg00001.html

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=133365109612558&w=2

Trust: 1.0

url:http://technet.microsoft.com/security/advisory/2588513

Trust: 1.0

url:http://www.securitytracker.com/id/1029190

Trust: 1.0

url:http://www.securityfocus.com/bid/49388

Trust: 1.0

url:http://osvdb.org/74829

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=132872385320240&w=2

Trust: 1.0

url:http://lists.apple.com/archives/security-announce/2012/feb/msg00000.html

Trust: 1.0

url:http://www.insecure.cl/beast-ssl.rar

Trust: 1.0

url:http://www.securitytracker.com/id?1026704

Trust: 1.0

url:https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_fetchmail

Trust: 1.0

url:http://lists.apple.com/archives/security-announce/2012/sep/msg00004.html

Trust: 1.0

url:http://support.apple.com/kb/ht5001

Trust: 1.0

url:http://www.mandriva.com/security/advisories?name=mdvsa-2012:058

Trust: 1.0

url:http://support.apple.com/kb/ht5501

Trust: 1.0

url:http://rhn.redhat.com/errata/rhsa-2013-1455.html

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00040.html

Trust: 1.0

url:http://www.opera.com/docs/changelogs/unix/1160/

Trust: 1.0

url:http://secunia.com/advisories/48915

Trust: 1.0

url:http://blog.mozilla.com/security/2011/09/27/attack-against-tls-protected-communications/

Trust: 1.0

url:http://secunia.com/advisories/49198

Trust: 1.0

url:http://secunia.com/advisories/48948

Trust: 1.0

url:http://www.opera.com/docs/changelogs/mac/1160/

Trust: 1.0

url:http://lists.apple.com/archives/security-announce/2012/jul/msg00001.html

Trust: 1.0

url:http://www.redhat.com/support/errata/rhsa-2012-0006.html

Trust: 1.0

url:http://www.securitytracker.com/id?1026103

Trust: 1.0

url:http://lists.apple.com/archives/security-announce/2013/oct/msg00004.html

Trust: 1.0

url:http://lists.apple.com/archives/security-announce/2011//oct/msg00002.html

Trust: 1.0

url:http://secunia.com/advisories/48692

Trust: 1.0

url:http://security.gentoo.org/glsa/glsa-201203-02.xml

Trust: 1.0

url:http://downloads.asterisk.org/pub/security/ast-2016-001.html

Trust: 1.0

url:http://www.redhat.com/support/errata/rhsa-2011-1384.html

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=134254957702612&w=2

Trust: 1.0

url:http://www.ubuntu.com/usn/usn-1263-1

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html

Trust: 1.0

url:http://www.debian.org/security/2012/dsa-2398

Trust: 1.0

url:https://hermes.opensuse.org/messages/13155432

Trust: 1.0

url:http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html

Trust: 1.0

url:http://support.apple.com/kb/ht5281

Trust: 1.0

url:http://www.opera.com/docs/changelogs/mac/1151/

Trust: 1.0

url:http://www.opera.com/docs/changelogs/windows/1151/

Trust: 1.0

url:http://eprint.iacr.org/2006/136

Trust: 1.0

url:http://www.opera.com/docs/changelogs/unix/1151/

Trust: 1.0

url:http://secunia.com/advisories/48256

Trust: 1.0

url:http://secunia.com/advisories/45791

Trust: 1.0

url:http://www.us-cert.gov/cas/techalerts/ta12-010a.html

Trust: 1.0

url:http://support.apple.com/kb/ht6150

Trust: 1.0

url:https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-006

Trust: 1.0

url:http://secunia.com/advisories/55350

Trust: 1.0

url:https://ics-cert.us-cert.gov/advisories/icsma-18-058-02

Trust: 1.0

url:http://secunia.com/advisories/55322

Trust: 1.0

url:http://www.apcmedia.com/salestools/sjhn-7rkgnm/sjhn-7rkgnm_r4_en.pdf

Trust: 1.0

url:http://rhn.redhat.com/errata/rhsa-2012-0508.html

Trust: 1.0

url:http://isc.sans.edu/diary/ssl+tls+part+3+/11635

Trust: 1.0

url:http://my.opera.com/securitygroup/blog/2011/09/28/the-beast-ssl-tls-issue

Trust: 1.0

url:http://support.apple.com/kb/ht4999

Trust: 1.0

url:https://hermes.opensuse.org/messages/13154861

Trust: 1.0

url:http://www.securitytracker.com/id?1025997

Trust: 1.0

url:http://www.securityfocus.com/bid/49778

Trust: 1.0

url:http://support.apple.com/kb/ht5130

Trust: 1.0

url:http://eprint.iacr.org/2004/111

Trust: 1.0

url:http://www.openssl.org/~bodo/tls-cbc.txt

Trust: 0.8

url:http://www.phonefactor.com/blog/slaying-beast-mitigating-the-latest-ssltls-vulnerability.php

Trust: 0.8

url:https://blog.torproject.org/blog/tor-and-beast-ssl-attack

Trust: 0.8

url:http://src.chromium.org/viewvc/chrome?view=rev&revision=97269

Trust: 0.8

url:http://www.ekoparty.org/2011/juliano-rizzo.php

Trust: 0.8

url:http://www.hitachi.co.jp/prod/comp/soft1/global/security/info/vuls/hs11-024/index.html

Trust: 0.4

url:http://www.collax.com/download/file/target/frame/file/2926

Trust: 0.3

url:http://www.collax.com/produkte/allinone-server-for-small-businesses

Trust: 0.3

url:http://www.collax.com/download/file/target/frame/file/2930

Trust: 0.3

url:http://www.collax.com/produkte/email-calendar-contacts-in-a-safe-business-server

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21578730

Trust: 0.3

url:http://blogs.oracle.com/sunsecurity/entry/cve_2011_3389_chosen_plaintext2

Trust: 0.3

url:seclists.org/bugtraq/2014/apr/att-70/esa-2012-032.txt

Trust: 0.3

url:http://seclists.org/bugtraq/2012/sep/att-39/esa-2012-032.txt

Trust: 0.3

url:http://seclists.org/bugtraq/2014/mar/att-156/esa-2014-016.txt

Trust: 0.3

url:http://www.theregister.co.uk/2011/09/19/beast_exploits_paypal_ssl/

Trust: 0.3

url:http://xforce.iss.net/xforce/xfdb/70069

Trust: 0.3

url:http://www.kerio.com/connect/history

Trust: 0.3

url:http://www.matrixssl.org/

Trust: 0.3

url:https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_python

Trust: 0.3

url:http://www.novell.com/support/viewcontent.do?externalid=7009901&sliceid=1

Trust: 0.3

url:http://www.opera.com/support/kb/view/1000/

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg1pm60958

Trust: 0.3

url:https://www-304.ibm.com/connections/blogs/psirt/entry/security_bulletin_ibm_system_x_and_flex_systems_browser_exploit_against_ssl_tls_beast_mitigations_cve_2011_33891?lang=en_us

Trust: 0.3

url:http://tools.ietf.org/html/draft-ietf-tls-ssl-version3-00

Trust: 0.3

url:http://www.ibm.com/support/docview.wss?uid=swg21568229

Trust: 0.3

url:http://www.ietf.org/rfc/rfc2246.txt

Trust: 0.3

url:http://www.ibm.com/support/docview.wss?uid=swg21571596

Trust: 0.3

url:/archive/1/524142

Trust: 0.3

url:http://support.apple.com/kb/ht5416

Trust: 0.3

url:http://support.avaya.com/css/p8/documents/100151219

Trust: 0.3

url:http://support.avaya.com/css/p8/documents/100150852

Trust: 0.3

url:http://support.avaya.com/css/p8/documents/100154049

Trust: 0.3

url:http://support.avaya.com/css/p8/documents/100154899

Trust: 0.3

url:http://seclists.org/bugtraq/2013/jun/att-65/esa-2013-039.txt

Trust: 0.3

url:http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?objectid=c03358587

Trust: 0.3

url:http://h20565.www2.hp.com/portal/site/hpsc/template.page/public/kb/docdisplay/?docid=emr_na-c03909126-1&ac.admitted=1378134276525.876444892.492883150

Trust: 0.3

url:http://h20565.www2.hp.com/portal/site/hpsc/public/kb/docdisplay/?docid=emr_na-c03266681&ac.admitted=1333452464452.876444892.492883150

Trust: 0.3

url:http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5093636

Trust: 0.3

url:https://www.us-cert.gov/ics/advisories/icsa-19-192-04

Trust: 0.3

url:http://technet.microsoft.com/en-us/security/advisory/2588513

Trust: 0.3

url:http://technet.microsoft.com/en-us/security/bulletin/ms12-006

Trust: 0.3

url:http://www.hitachi.co.jp/prod/comp/soft1/global/security/info/vuls/hs13-018/index.html

Trust: 0.3

url:http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21643845

Trust: 0.3

url:http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5093630

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21641966

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=isg3t1022152

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21609004

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg21609022

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=isg3t1019998

Trust: 0.3

url:http://lists.vmware.com/pipermail/security-announce/2012/000162.html

Trust: 0.3

url:http://www.vmware.com/security/advisories/vmsa-2012-0005.html

Trust: 0.3

url:http://www.hitachi.co.jp/prod/comp/soft1/global/security/info/vuls/hs14-011/index.html

Trust: 0.3

url:http://www.xerox.com/download/security/security-bulletin/12047-4e4eed8d42ca6/cert_xrx13-007_v1.0.pdf

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2011-3389

Trust: 0.3

url:http://creativecommons.org/licenses/by-sa/2.5

Trust: 0.2

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3555

Trust: 0.2

url:http://security.gentoo.org/

Trust: 0.2

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3389

Trust: 0.2

url:https://bugs.gentoo.org.

Trust: 0.2

url:http://secunia.com/advisories/46694/#comments

Trust: 0.1

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/products/corporate/vim/ovum_2011_request/

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=46694

Trust: 0.1

url:http://secunia.com/advisories/46694/

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-4470

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3574

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3423

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3548

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3565

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2469

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0864

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3553

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2443

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1717

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-2412

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1716

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0505

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1518

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2419

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3557

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-2414

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4450

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-3829

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5829

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5804

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1485

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5806

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5087

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2422

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0865

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4471

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5075

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3557

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-3562

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2426

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-3567

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-4002

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5084

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1711

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1478

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2461

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5820

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5979

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-6954

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2470

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4476

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0547

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4540

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0429

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0441

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2451

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2459

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5823

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-2421

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0870

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3554

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0862

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2460

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1713

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0706

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0434

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5784

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-3568

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5830

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3561

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5800

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4467

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3567

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2456

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5803

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4465

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4472

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5086

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3556

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0425

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2383

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2423

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2447

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2452

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2445

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2450

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5778

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5780

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5073

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3568

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3548

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1493

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2446

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5069

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-5035

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-3541

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-3566

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3549

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1500

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3562

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3571

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0426

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0457

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5850

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-2783

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3573

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3552

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0451

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0459

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-2423

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-1876

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2384

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4469

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0431

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1557

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0458

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2548

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2453

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4448

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3521

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0401

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5085

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2407

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2421

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-3564

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2429

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-4465

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3569

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-2403

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5068

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-2548

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0871

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5071

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-2398

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0432

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0815

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0444

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1475

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0497

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5774

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5782

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-3554

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-4469

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1725

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5790

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5805

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3564

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5802

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5849

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1719

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-3569

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-3573

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0461

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0442

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2448

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2458

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0427

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-3548

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-2427

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5825

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0506

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1484

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2430

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3541

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2415

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-3549

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-3565

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0872

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3216

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0429

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1718

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5772

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-3860

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3422

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0433

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5074

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3554

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-3574

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2454

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2444

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5072

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4470

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2436

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4416

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0822

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1537

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-3553

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-3555

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3551

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2449

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0503

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0025

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2457

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1476

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0169

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0424

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3563

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0809

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5077

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0435

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3544

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0456

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-4450

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1723

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1726

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0450

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1571

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-4467

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0460

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5081

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3547

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5840

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5851

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2465

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2431

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2473

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-6629

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5783

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-4448

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2783

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2463

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3560

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2412

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5809

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1480

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4351

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2420

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0501

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0428

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0869

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2417

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2471

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3566

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3551

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2424

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5076

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5842

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-2397

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0452

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3553

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1569

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1724

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3558

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5797

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5070

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1486

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2472

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0446

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0453

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3860

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1488

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0502

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-3561

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0868

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0440

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0443

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5814

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5817

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-4351

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-3551

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2455

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-3557

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5089

Trust: 0.1

url:https://www.apple.com/support/security/pgp/

Trust: 0.1

url:http://developer.apple.com/

Trust: 0.1

url:http://support.apple.com/kb/ht1222

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-3698

Trust: 0.1

url:http://gpgtools.org

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1965

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3985

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0079

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-4688

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-4070

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0082

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2371

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-0169

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-4061

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1210

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4181

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-1832

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1994

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-4058

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-1828

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-0353

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-1838

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3975

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2766

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1205

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-4061

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3767

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0473

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-0172

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1971

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0479

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-2043

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3175

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3973

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3655

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2760

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-1187

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1961

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0447

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-2462

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0456

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2770

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1125

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3958

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3777

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3003

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0067

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3174

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-0168

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0057

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0443

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2993

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3376

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-5017

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1940

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3069

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2989

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5836

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-0182

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4179

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-2436

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3072

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1208

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3967

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2375

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2376

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3971

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3772

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3977

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3965

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0469

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3978

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4183

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-1834

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-2472

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3378

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2767

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1952

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0078

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-0170

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-0164

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-0775

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3400

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1211

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3372

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2769

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4188

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-5012

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4206

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5354

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-5504

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-4067

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3648

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-0776

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3071

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0477

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-2467

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0475

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3962

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-2408

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-1304

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4201

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4202

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4182

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1206

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3990

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1975

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-1392

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-4070

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-2044

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3183

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-3835

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-4068

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-5507

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-4059

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-5023

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-1308

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-1044

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-5508

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-0654

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0070

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-4065

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-1307

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3866

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0080

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2984

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0478

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1213

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-0352

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-5014

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-2664

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0051

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3989

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3984

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3371

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3382

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4180

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-4068

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4194

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-4582

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-5502

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4193

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2007-2437

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3978

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-1835

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3993

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-5506

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3375

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3078

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-0173

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3075

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3969

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0462

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2605

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-1169

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-1311

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-4066

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3658

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1973

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3004

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1950

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1972

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2369

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1215

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4216

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-4062

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0463

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3001

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-0167

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3381

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3988

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0452

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-3837

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-1837

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2374

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3994

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1960

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1963

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3167

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-0774

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-4065

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-5022

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-5024

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0468

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3026

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1203

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0074

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-2061

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0085

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3980

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1966

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1945

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4184

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1959

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-4060

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0077

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3000

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0071

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0068

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1974

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-0016

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-2065

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-4066

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0081

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-4063

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1955

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-1302

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-5503

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3374

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3968

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1028

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-4059

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3005

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4185

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2986

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-0176

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5839

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1121

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3661

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2765

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-5913

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3169

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5843

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3663

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3651

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-5016

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2372

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1951

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3274

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1197

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3964

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1953

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-4067

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2997

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3778

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2996

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3232

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0061

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-4063

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-3073

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-2654

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-0354

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-5500

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3380

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1212

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-0357

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1976

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-0773

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-0220

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-0071

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-0777

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0055

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-5052

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-0165

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-2464

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2378

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3131

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-0160

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-1836

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-5513

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3986

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-0367

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2752

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3388

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-2469

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2753

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3650

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3002

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2764

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3983

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2751

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4190

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-2477

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-1833

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2981

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2768

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2991

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-0358

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2373

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3670

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3987

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3976

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-4582

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3377

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4208

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1956

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4186

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0441

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0054

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3166

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-5014

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2370

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2007-2671

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-2662

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-1309

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-1840

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3957

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1585

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5840

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1207

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0445

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2998

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-0355

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1200

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2362

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3077

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0056

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2987

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3101

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-5501

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4195

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4209

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3985

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1962

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3660

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2762

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5833

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-1839

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2988

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-0648

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3101

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3168

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0072

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2995

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3399

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-0171

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2983

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5841

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5838

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-5019

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2985

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0458

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2007-3073

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3659

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-3837

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0066

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-3836

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-0174

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5842

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0457

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3176

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-5511

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-0356

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4205

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-0178

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3379

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-4064

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4508

Trust: 0.1

url:http://www.mozilla.org/security/announce/2011/mfsa2011-34.html

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-1310

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-0016

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1967

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-1306

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3079

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-2471

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0073

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0474

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0444

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0455

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1954

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-4062

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3647

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4210

Trust: 0.1

url:http://blog.mozilla.org/security/2011/03/22/firefox-blocking-fraudulent-c=

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-0017

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-1305

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0446

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5835

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3966

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-0181

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0069

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-5013

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3979

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0450

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1214

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1196

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0449

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0062

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-1841

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3179

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-0367

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3765

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1947

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3070

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-4060

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3992

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-1563

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0442

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-0175

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-1712

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1199

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2365

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-2404

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3775

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1198

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-2535

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1938

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-5505

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1946

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-5512

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-5074

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4187

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3766

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-2437

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1949

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3776

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5830

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0075

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1202

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-0652

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1958

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-5015

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-0163

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-4069

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-0179

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-1313

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-0159

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1939

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3972

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3182

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4207

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-6961

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2990

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3970

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3178

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-2671

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-4069

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3180

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4191

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3956

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4204

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2763

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2982

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3986

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3654

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2364

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3389

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2980

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3963

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0464

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1209

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2754

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-2470

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-2210

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-1202

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5829

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3982

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3173

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3774

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3995

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-5510

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4192

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-2463

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0467

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1964

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3959

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3770

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3769

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-0772

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3665

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4196

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-5822

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-2466

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3649

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3653

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3768

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-2478

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3988

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-1312

Trust: 0.1

url:http://www.mozilla.org/security/announce/2011/mfsa2011-11.html

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0058

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3771

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-2479

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3383

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-1303

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-2465

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3170

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2377

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3991

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3982

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-5012

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1957

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2755

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1948

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3961

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0470

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3773

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3076

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-0166

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-1571

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3984

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3640

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-4064

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2007-2436

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3981

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1970

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0461

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4215

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-5021

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-4058

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0451

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-0771

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-0017

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-3836

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-5013

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4212

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0459

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0076

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0083

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0460

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-0183

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1201

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3960

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0059

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-0177

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3062

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-5018

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3177

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3980

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2363

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0084

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3652

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1941

Trust: 0.1

url:http://security.gentoo.org/glsa/glsa-201301-01.xml

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3074

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1937

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-3835

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0053

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3171

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2999

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0471

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0065

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-0162

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3373

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-2665

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-0507

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3549

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3521

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-0503

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3563

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3545

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3560

Trust: 0.1

url:http://h20566.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/

Trust: 0.1

url:http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3554

Trust: 0.1

url:http://www.hp.com/go/java

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3552

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-0499

Trust: 0.1

url:https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docdisplay/?docid=emr_na-c02964430

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3556

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-0501

Trust: 0.1

url:https://www.hp.com/go/swa

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3557

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-0498

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-0502

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3548

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-0505

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3547

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-0506

Trust: 0.1

url:http://curl.haxx.se/libcurl/c/curl_easy_setopt.html#curloptssloptions

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-0036

Trust: 0.1

url:http://thread.gmane.org/gmane.comp.web.curl.library/34659

Trust: 0.1

url:http://www.mandriva.com/security/

Trust: 0.1

url:http://curl.haxx.se/docs/adv_20120124.html

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-0036

Trust: 0.1

url:http://www.mandriva.com/security/advisories

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-3389

Trust: 0.1

url:http://curl.haxx.se/docs/manpage.html#--ssl-allow-beast

Trust: 0.1

sources: CERT/CC: VU#864643 // BID: 49778 // PACKETSTORM: 106747 // PACKETSTORM: 127267 // PACKETSTORM: 115046 // PACKETSTORM: 119293 // PACKETSTORM: 111633 // PACKETSTORM: 111851 // NVD: CVE-2011-3389

CREDITS

Thai Duong and Juliano Rizzo, Wendy Parrington from United Utilities.

Trust: 0.3

sources: BID: 49778

SOURCES

db:CERT/CCid:VU#864643
db:VULMONid:CVE-2011-3389
db:BIDid:49778
db:PACKETSTORMid:106747
db:PACKETSTORMid:127267
db:PACKETSTORMid:115046
db:PACKETSTORMid:119293
db:PACKETSTORMid:111633
db:PACKETSTORMid:111851
db:NVDid:CVE-2011-3389

LAST UPDATE DATE

2025-04-27T19:40:05.227000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#864643date:2011-12-08T00:00:00
db:VULMONid:CVE-2011-3389date:2022-11-29T00:00:00
db:BIDid:49778date:2019-07-16T13:00:00
db:NVDid:CVE-2011-3389date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:CERT/CCid:VU#864643date:2011-09-27T00:00:00
db:VULMONid:CVE-2011-3389date:2011-09-06T00:00:00
db:BIDid:49778date:2011-09-19T00:00:00
db:PACKETSTORMid:106747date:2011-11-08T04:55:18
db:PACKETSTORMid:127267date:2014-06-30T23:39:28
db:PACKETSTORMid:115046date:2012-07-27T00:13:31
db:PACKETSTORMid:119293date:2013-01-08T03:21:24
db:PACKETSTORMid:111633date:2012-04-06T02:42:03
db:PACKETSTORMid:111851date:2012-04-13T22:09:17
db:NVDid:CVE-2011-3389date:2011-09-06T19:55:03.197