ID

VAR-201211-0356


CVE

CVE-2012-5134


TITLE

Google Chrome Used in libxml2 Service disruption in (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2012-005575

DESCRIPTION

Heap-based buffer underflow in the xmlParseAttValueComplex function in parser.c in libxml2 2.9.0 and earlier, as used in Google Chrome before 23.0.1271.91 and other products, allows remote attackers to cause a denial of service or possibly execute arbitrary code via crafted entities in an XML document. Google Chrome is prone to multiple security vulnerabilities. Attackers can exploit these issues to execute arbitrary code in the context of the browser, cause denial-of-service conditions, and bypass the same-origin policy; other attacks may also be possible. The issue (described by CVE-2012-5131) has been moved to BID 56752 (Apple Mac OS X Intel GPU Driver Unspecified Security Vulnerability) to better document it. Versions prior to Chrome 23.0.1271.91 are vulnerable. 6) - i386, x86_64 3. The desktop must be restarted (log out, then log back in) for this update to take effect. Bugs fixed (http://bugzilla.redhat.com/): 880466 - CVE-2012-5134 libxml2: Heap-buffer-underflow in xmlParseAttValueComplex 6. Content-Disposition: inline ==========================================================================Ubuntu Security Notice USN-1656-1 December 06, 2012 libxml2 vulnerability ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 12.10 - Ubuntu 12.04 LTS - Ubuntu 11.10 - Ubuntu 10.04 LTS - Ubuntu 8.04 LTS Summary: Applications using libxml2 could be made to crash or run programs as your login if they opened a specially crafted file. Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 12.10: libxml2 2.8.0+dfsg1-5ubuntu2.1 Ubuntu 12.04 LTS: libxml2 2.7.8.dfsg-5.1ubuntu4.3 Ubuntu 11.10: libxml2 2.7.8.dfsg-4ubuntu0.5 Ubuntu 10.04 LTS: libxml2 2.7.6.dfsg-1ubuntu1.7 Ubuntu 8.04 LTS: libxml2 2.6.31.dfsg-2ubuntu1.11 After a standard system update you need to reboot your computer to make all the necessary changes. Background ========== libxml2 is the XML C parser and toolkit developed for the Gnome project. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 dev-libs/libxml2 < 2.9.1-r1 >= 2.9.1-r1 Description =========== Multiple vulnerabilities have been discovered in libxml2. Please review the CVE identifiers referenced below for details. Workaround ========== There is no known workaround at this time. Resolution ========== All libxml2 users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=dev-libs/libxml2-2.9.1-r1" References ========== [ 1 ] CVE-2012-2871 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2871 [ 2 ] CVE-2012-5134 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5134 [ 3 ] CVE-2013-0338 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0338 [ 4 ] CVE-2013-1664 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1664 [ 5 ] CVE-2013-1969 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1969 [ 6 ] CVE-2013-2877 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2877 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-201311-06.xml Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2013 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5 . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: mingw32-libxml2 security update Advisory ID: RHSA-2013:0217-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2013-0217.html Issue date: 2013-01-31 CVE Names: CVE-2010-4008 CVE-2010-4494 CVE-2011-0216 CVE-2011-1944 CVE-2011-2821 CVE-2011-2834 CVE-2011-3102 CVE-2011-3905 CVE-2011-3919 CVE-2012-0841 CVE-2012-5134 ===================================================================== 1. Summary: Updated mingw32-libxml2 packages that fix several security issues are now available for Red Hat Enterprise Linux 6. This advisory also contains information about future updates for the mingw32 packages, as well as the deprecation of the packages with the release of Red Hat Enterprise Linux 6.4. The Red Hat Security Response Team has rated this update as having important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop Optional (v. 6) - noarch Red Hat Enterprise Linux HPC Node Optional (v. 6) - noarch Red Hat Enterprise Linux Server Optional (v. 6) - noarch Red Hat Enterprise Linux Workstation Optional (v. 6) - noarch 3. Description: These packages provide the libxml2 library, a development toolbox providing the implementation of various XML standards, for users of MinGW (Minimalist GNU for Windows). IMPORTANT NOTE: The mingw32 packages in Red Hat Enterprise Linux 6 will no longer be updated proactively and will be deprecated with the release of Red Hat Enterprise Linux 6.4. These packages were provided to support other capabilities in Red Hat Enterprise Linux and were not intended for direct customer use. Customers are advised to not use these packages with immediate effect. Future updates to these packages will be at Red Hat's discretion and these packages may be removed in a future minor release. A heap-based buffer overflow flaw was found in the way libxml2 decoded entity references with long names. (CVE-2011-3919) A heap-based buffer underflow flaw was found in the way libxml2 decoded certain entities. (CVE-2012-5134) It was found that the hashing routine used by libxml2 arrays was susceptible to predictable hash collisions. Sending a specially-crafted message to an XML service could result in longer processing time, which could lead to a denial of service. To mitigate this issue, randomization has been added to the hashing function to reduce the chance of an attacker successfully causing intentional collisions. (CVE-2012-0841) Multiple flaws were found in the way libxml2 parsed certain XPath (XML Path Language) expressions. If an attacker were able to supply a specially-crafted XML file to an application using libxml2, as well as an XPath expression for that application to run against the crafted file, it could cause the application to crash. (CVE-2010-4008, CVE-2010-4494, CVE-2011-2821, CVE-2011-2834) Two heap-based buffer overflow flaws were found in the way libxml2 decoded certain XML files. (CVE-2011-0216, CVE-2011-3102) An integer overflow flaw, leading to a heap-based buffer overflow, was found in the way libxml2 parsed certain XPath expressions. (CVE-2011-1944) An out-of-bounds memory read flaw was found in libxml2. A remote attacker could provide a specially-crafted XML file that, when opened in an application linked against libxml2, would cause the application to crash. (CVE-2011-3905) Red Hat would like to thank the Google Security Team for reporting the CVE-2010-4008 issue. Upstream acknowledges Bui Quang Minh from Bkis as the original reporter of CVE-2010-4008. All users of mingw32-libxml2 are advised to upgrade to these updated packages, which contain backported patches to correct these issues. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/knowledge/articles/11258 5. Bugs fixed (http://bugzilla.redhat.com/): 645341 - CVE-2010-4008 libxml2: Crash (stack frame overflow or NULL pointer dereference) by traversal of XPath axis 665963 - CVE-2010-4494 libxml2: double-free in XPath processing code 709747 - CVE-2011-1944 libxml, libxml2: Heap-based buffer overflow by adding new namespace node to an existing nodeset or merging nodesets 724906 - CVE-2011-0216 libxml2: Off-by-one error leading to heap-based buffer overflow in encoding 735712 - CVE-2011-2821 libxml2: double free caused by malformed XPath expression in XSLT 735751 - CVE-2011-2834 libxml2: double-free caused by malformed XPath expression in XSLT 767387 - CVE-2011-3905 libxml2 out of bounds read 771896 - CVE-2011-3919 libxml2: Heap-based buffer overflow when decoding an entity reference with a long name 787067 - CVE-2012-0841 libxml2: hash table collisions CPU usage DoS 822109 - CVE-2011-3102 libxml: An off-by-one out-of-bounds write by XPointer part evaluation 880466 - CVE-2012-5134 libxml2: Heap-buffer-underflow in xmlParseAttValueComplex 6. Package List: Red Hat Enterprise Linux Desktop Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/mingw32-libxml2-2.7.6-6.el6_3.src.rpm noarch: mingw32-libxml2-2.7.6-6.el6_3.noarch.rpm mingw32-libxml2-debuginfo-2.7.6-6.el6_3.noarch.rpm mingw32-libxml2-static-2.7.6-6.el6_3.noarch.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/mingw32-libxml2-2.7.6-6.el6_3.src.rpm noarch: mingw32-libxml2-2.7.6-6.el6_3.noarch.rpm mingw32-libxml2-debuginfo-2.7.6-6.el6_3.noarch.rpm mingw32-libxml2-static-2.7.6-6.el6_3.noarch.rpm Red Hat Enterprise Linux Server Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/mingw32-libxml2-2.7.6-6.el6_3.src.rpm noarch: mingw32-libxml2-2.7.6-6.el6_3.noarch.rpm mingw32-libxml2-debuginfo-2.7.6-6.el6_3.noarch.rpm mingw32-libxml2-static-2.7.6-6.el6_3.noarch.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/mingw32-libxml2-2.7.6-6.el6_3.src.rpm noarch: mingw32-libxml2-2.7.6-6.el6_3.noarch.rpm mingw32-libxml2-debuginfo-2.7.6-6.el6_3.noarch.rpm mingw32-libxml2-static-2.7.6-6.el6_3.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2010-4008.html https://www.redhat.com/security/data/cve/CVE-2010-4494.html https://www.redhat.com/security/data/cve/CVE-2011-0216.html https://www.redhat.com/security/data/cve/CVE-2011-1944.html https://www.redhat.com/security/data/cve/CVE-2011-2821.html https://www.redhat.com/security/data/cve/CVE-2011-2834.html https://www.redhat.com/security/data/cve/CVE-2011-3102.html https://www.redhat.com/security/data/cve/CVE-2011-3905.html https://www.redhat.com/security/data/cve/CVE-2011-3919.html https://www.redhat.com/security/data/cve/CVE-2012-0841.html https://www.redhat.com/security/data/cve/CVE-2012-5134.html https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2013 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFRCujqXlSAg2UNWIIRAq0HAJ41YXDqlCpJkg97YuQmaF2MqKDIpACgn5j7 sLTqWGtUMTYIUvLH8YXGFX4= =rOjB -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . For the stable distribution (squeeze), this problem has been fixed in version 2.7.8.dfsg-2+squeeze6. For the unstable distribution (sid), this problem has been fixed in version 2.8.0+dfsg1-7. ---------------------------------------------------------------------- The final version of the CSI 6.0 has been released. Find out why this is not just another Patch Management solution: http://secunia.com/blog/325/ ---------------------------------------------------------------------- TITLE: Google Chrome Multiple Vulnerabilities SECUNIA ADVISORY ID: SA51437 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/51437/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=51437 RELEASE DATE: 2012-11-27 DISCUSS ADVISORY: http://secunia.com/advisories/51437/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/51437/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=51437 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: Multiple vulnerabilities have been reported in Google Chrome, where one has an unknown impact and others can be exploited by malicious people to compromise a user's system. 1) A use-after-free error exists in SVG filters. 3) An error exists within the libxml2 library. For more information see vulnerability #2: SA48000 4) A use-after-free error exists within printing. 5) A bad cast error exists within input element handling. SOLUTION: Update to version 23.0.1271.91. ORIGINAL ADVISORY: http://googlechromereleases.blogspot.dk/2012/11/stable-channel-update.html OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . The verification of md5 checksums and GPG signatures is performed automatically for you. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 APPLE-SA-2013-09-20-1 Apple TV 6.0 Apple TV 6.0 is now available and addresses the following: Apple TV Available for: Apple TV 2nd generation and later Impact: Viewing a maliciously crafted PDF file may lead to an unexpected application termination or arbitrary code execution Description: A buffer overflow existed in the handling of JBIG2 encoded data in PDF files. This issue was addressed through additional bounds checking. CVE-ID CVE-2013-1025 : Felix Groebert of the Google Security Team Apple TV Available for: Apple TV 2nd generation and later Impact: Playing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution Description: A buffer overflow existed in the handling of Sorenson encoded movie files. This issue was addressed through improved bounds checking. CVE-ID CVE-2013-1019 : Tom Gallagher (Microsoft) & Paul Bates (Microsoft) working with HP's Zero Day Initiative Apple TV Available for: Apple TV 2nd generation and later Impact: An attacker with a privileged network position may intercept user credentials or other sensitive information Description: TrustWave, a trusted root CA, has issued, and subsequently revoked, a sub-CA certificate from one of its trusted anchors. This sub-CA facilitated the interception of communications secured by Transport Layer Security (TLS). This update added the involved sub-CA certificate to OS X's list of untrusted certificates. CVE-ID CVE-2013-5134 Apple TV Available for: Apple TV 2nd generation and later Impact: An attacker who has arbitrary code execution on a device may be able to persist code execution across reboots Description: Multiple buffer overflows existed in dyld's openSharedCacheFile() function. These issues were addressed through improved bounds checking. CVE-ID CVE-2013-3950 : Stefan Esser Apple TV Available for: Apple TV 2nd generation and later Impact: Viewing a maliciously crafted PDF file may lead to an unexpected application termination or arbitrary code execution Description: A buffer overflow existed in the handling of JPEG2000 encoded data in PDF files. This issue was addressed through additional bounds checking. CVE-ID CVE-2013-1026 : Felix Groebert of the Google Security Team Apple TV Available for: Apple TV 2nd generation and later Impact: A malicious local application could cause an unexpected system termination Description: A null pointer dereference existed in IOCatalogue. The issue was addressed through additional type checking. CVE-ID CVE-2013-5138 : Will Estes Apple TV Available for: Apple TV 2nd generation and later Impact: Executing a malicious application may result in arbitrary code execution within the kernel Description: An out of bounds array access existed in the IOSerialFamily driver. This issue was addressed through additional bounds checking. CVE-ID CVE-2013-5139 : @dent1zt Apple TV Available for: Apple TV 2nd generation and later Impact: A remote attacker can cause a device to unexpectedly restart Description: Sending an invalid packet fragment to a device can cause a kernel assert to trigger, leading to a device restart. The issue was addressed through additional validation of packet fragments. CVE-ID CVE-2013-5140 : Joonas Kuorilehto of Codenomicon, an anonymous researcher working with CERT-FI, Antti LevomAki and Lauri Virtanen of Vulnerability Analysis Group, Stonesoft Apple TV Available for: Apple TV 2nd generation and later Impact: An attacker on a local network can cause a denial of service Description: An attacker on a local network can send specially crafted IPv6 ICMP packets and cause high CPU load. The issue was addressed by rate limiting ICMP packets before verifying their checksum. CVE-ID CVE-2011-2391 : Marc Heuse Apple TV Available for: Apple TV 2nd generation and later Impact: Kernel stack memory may be disclosed to local users Description: An information disclosure issue existed in the msgctl and segctl APIs. This issue was addressed by initializing data structures returned from the kernel. CVE-ID CVE-2013-5142 : Kenzley Alphonse of Kenx Technology, Inc Apple TV Available for: Apple TV 2nd generation and later Impact: Unprivileged processes could get access to the contents of kernel memory which could lead to privilege escalation Description: An information disclosure issue existed in the mach_port_space_info API. This issue was addressed by initializing the iin_collision field in structures returned from the kernel. CVE-ID CVE-2013-3953 : Stefan Esser Apple TV Available for: Apple TV 2nd generation and later Impact: Unprivileged processes may be able to cause an unexpected system termination or arbitrary code execution in the kernel Description: A memory corruption issue existed in the handling of arguments to the posix_spawn API. This issue was addressed through additional bounds checking. CVE-ID CVE-2013-3954 : Stefan Esser Apple TV Available for: Apple TV 2nd generation and later Impact: An unauthorized process may modify the set of loaded kernel extensions Description: An issue existed in kextd's handling of IPC messages from unauthenticated senders. This issue was addressed by adding additional authorization checks. CVE-ID CVE-2013-5145 : "Rainbow PRISM" Apple TV Available for: Apple TV 2nd generation and later Impact: Viewing a maliciously crafted web page may lead to an unexpected application termination or arbitrary code execution Description: Multiple memory corruption issues existed in libxml. These issues were addressed by updating libxml to version 2.9.0. CVE-ID CVE-2011-3102 : Juri Aedla CVE-2012-0841 CVE-2012-2807 : Juri Aedla CVE-2012-5134 : Google Chrome Security Team (Juri Aedla) Apple TV Available for: Apple TV 2nd generation and later Impact: Viewing a maliciously crafted web page may lead to an unexpected application termination or arbitrary code execution Description: Multiple memory corruption issues existed in libxslt. These issues were addressed by updating libxslt to version 1.1.28. CVE-ID CVE-2012-2825 : Nicolas Gregoire CVE-2012-2870 : Nicolas Gregoire CVE-2012-2871 : Kai Lu of Fortinet's FortiGuard Labs, Nicolas Gregoire Apple TV Available for: Apple TV 2nd generation and later Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution Description: Multiple memory corruption issues existed in WebKit. These issues were addressed through improved memory handling. CVE-ID CVE-2013-0879 : Atte Kettunen of OUSPG CVE-2013-0991 : Jay Civelli of the Chromium development community CVE-2013-0992 : Google Chrome Security Team (Martin Barbella) CVE-2013-0993 : Google Chrome Security Team (Inferno) CVE-2013-0994 : David German of Google CVE-2013-0995 : Google Chrome Security Team (Inferno) CVE-2013-0996 : Google Chrome Security Team (Inferno) CVE-2013-0997 : Vitaliy Toropov working with HP's Zero Day Initiative CVE-2013-0998 : pa_kt working with HP's Zero Day Initiative CVE-2013-0999 : pa_kt working with HP's Zero Day Initiative CVE-2013-1000 : Fermin J. Alternatively, you may manually check for software updates by selecting "Settings -> General -> Update Software". To check the current version of software, select "Settings -> General -> About"

Trust: 2.7

sources: NVD: CVE-2012-5134 // JVNDB: JVNDB-2012-005575 // BID: 56684 // VULHUB: VHN-58415 // PACKETSTORM: 118451 // PACKETSTORM: 118639 // PACKETSTORM: 123959 // PACKETSTORM: 119960 // PACKETSTORM: 118533 // PACKETSTORM: 118407 // PACKETSTORM: 118546 // PACKETSTORM: 123339

AFFECTED PRODUCTS

vendor:xmlsoftmodel:libxml2scope:lteversion:2.9.0

Trust: 1.8

vendor:googlemodel:chromescope:eqversion:23.0.1271.32

Trust: 1.6

vendor:googlemodel:chromescope:eqversion:23.0.1271.33

Trust: 1.6

vendor:xmlsoftmodel:libxml2scope:eqversion:1.8.16

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.6.3

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:4.3.2

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:3.2

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.64

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.4.24

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.4.19

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.36

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.49

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.6.0

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:5.0

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:4.3.3

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:4.3.5

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.6.1

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:6.0.1

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.11

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.1.0

Trust: 1.0

vendor:applemodel:iphone osscope:lteversion:6.1.4

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.56

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.22

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.1.1

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:1.1.4

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.4.13

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.0.0

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.4.2

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.55

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:3.1

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.4.17

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.20

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:1.1.0

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:4.2.1

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.7

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.12

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.2.0

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.37

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.40

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.46

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:1.8.4

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.6.8

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:4.0

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.1

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:4.2.5

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:1.1.1

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.5.0

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.2.5

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:6.0

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.2.6

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.61

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.2.11

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.3.11

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:6.1

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:3.0.1

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.0

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.5.10

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.5

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.5.8

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.18

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.4.6

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:2.2

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.85

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:1.8.3

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:4.0.2

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:1.1.3

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.2.7

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.38

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.4.15

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.6.12

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:1.0.1

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.54

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.4.7

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:4.0.1

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.2.9

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.4.12

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.39

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.58

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:5.1

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.2.2

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.4.8

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.3.1

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.4.4

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.6.5

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.3.7

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.3.9

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:4.1

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.6.17

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.30

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.4.14

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.50

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.7.2

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.41

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.8

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:1.8.7

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.60

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.4.29

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:3.0

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.7.6

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.2

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.4.3

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.6

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:4.3.1

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.3.14

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:1.0.2

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.44

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.4.16

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.26

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.87

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.19

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.5.7

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.15

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:1.7.0

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.6.26

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.4.9

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.5.11

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.6.11

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.4.27

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.7.7

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.6.27

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:2.1

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:1.8.5

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.4.22

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.51

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.9.0

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.2.3

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.3.2

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.52

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:1.1.5

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.7.1

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.4.1

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.2.10

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.57

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.62

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.86

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:3.1.3

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.4.5

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.31

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.7.5

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.21

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.5.4

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.35

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:3.2.1

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.6.7

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.4.30

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:2.0.1

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.4.28

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.6.9

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:1.7.1

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:1.7.3

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.6.16

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:1.7.4

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:1.8.10

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.6.13

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:3.2.2

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.4.20

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:1.8.0

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:6.1.3

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.6.32

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:2.0

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.4.23

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.45

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.4.25

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.4.21

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.84

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:3.1.2

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.4

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.2.8

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:5.0.1

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:1.0.0

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:1.8.9

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:5.1.1

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.16

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.6.20

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.3.10

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:1.8.2

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.4.18

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.3.4

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.6.18

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.3.6

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:1.7.2

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.7.4

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.17

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:1.8.13

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.6.22

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:1.8.6

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.10

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:2.1.1

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:6.1.2

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.88

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.3

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.53

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.2.1

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.6.4

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:1.1.2

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.13

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.83

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:1.8.1

Trust: 1.0

vendor:googlemodel:chromescope:lteversion:23.0.1271.89

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.3.0

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.3.3

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.4.26

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:2.0.0

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:6.0.2

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.14

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.3.5

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.3.8

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:2.2.1

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.23

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.6.14

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.4.11

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.7.0

Trust: 1.0

vendor:googlemodel:chromescope:eqversion:23.0.1271.24

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.7.3

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:2.0.2

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.6.6

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.2.4

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.4.10

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:1.8.14

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.6.2

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:4.3.0

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.3.13

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:4.2.8

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.3.12

Trust: 1.0

vendor:xmlsoftmodel:libxml2scope:eqversion:2.6.30

Trust: 1.0

vendor:googlemodel:chromescope:ltversion:23.0.1271.91

Trust: 0.8

vendor:applemodel:tvscope:ltversion:6.0 (apple tv first 2 after generation )

Trust: 0.8

vendor:applemodel:iosscope:ltversion:7 (ipad 2 or later )

Trust: 0.8

vendor:applemodel:iosscope:ltversion:7 (iphone 4 or later )

Trust: 0.8

vendor:applemodel:iosscope:ltversion:7 (ipod touch first 5 after generation )

Trust: 0.8

vendor:applemodel:itunesscope:ltversion:11.1.4 (windows 7)

Trust: 0.8

vendor:applemodel:itunesscope:ltversion:11.1.4 (windows 8)

Trust: 0.8

vendor:applemodel:itunesscope:ltversion:11.1.4 (windows vista)

Trust: 0.8

vendor:applemodel:itunesscope:ltversion:11.1.4 (windows xp sp2 or later )

Trust: 0.8

vendor:googlemodel:chromescope:eqversion:5.0.307.6

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375127

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:12.0.742.100

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.28

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.34

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.322.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.50

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.391.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.50

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.14

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.306.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.539.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.434.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.529.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:16.0.912.75

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.399.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.203

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:17.0.963.60

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.365.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.105

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.474.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.335.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.326.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.317.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.64

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.499.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.47255

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.408.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.11

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.76

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.40

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:6.1

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:11.10

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.39

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.447.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.507.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.366.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.307.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.35

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.2.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.213

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.306

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.530.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.348.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.458.1

Trust: 0.3

vendor:avayamodel:meeting exchange sp1scope:eqversion:5.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.208

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.507.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:0.2.149.27

Trust: 0.3

vendor:avayamodel:aura presence servicesscope:eqversion:5.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.18

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:10.04

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.342.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.307.11

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.366.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.18

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.12

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.15

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.82

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:1.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.395.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.6

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.28

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.13

Trust: 0.3

vendor:redmodel:hat enterprise linux hpc nodescope:eqversion:6

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:10.0.648.127

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:10.04

Trust: 0.3

vendor:avayamodel:aura communication managerscope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.25

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:6.1.3

Trust: 0.3

vendor:debianmodel:linux sparcscope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.225

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.418.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.385.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.319.0

Trust: 0.3

vendor:avayamodel:aura system platformscope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.408.6

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.20

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.366.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.535.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.445.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.514.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.443.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:9.0.597.107

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.219

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.374.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:17.0.96379

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.417.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.218

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.23

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.217

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.21

Trust: 0.3

vendor:avayamodel:aura system platform sp2scope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.57

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.27

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.342.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.418.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.7

Trust: 0.3

vendor:avayamodel:aura session manager sp1scope:eqversion:5.2

Trust: 0.3

vendor:avayamodel:aura communication managerscope:eqversion:5.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.71

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.407.0

Trust: 0.3

vendor:susemodel:linux enterprise server sp4scope:eqversion:10

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.518.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.346.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.421.0

Trust: 0.3

vendor:ubuntumodel:linux sparcscope:eqversion:10.04

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.51

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.390.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.38

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.382.0

Trust: 0.3

vendor:susemodel:linux enterprise server sp2scope:eqversion:11

Trust: 0.3

vendor:avayamodel:voice portalscope:eqversion:5.1.2

Trust: 0.3

vendor:avayamodel:meeting exchange sp2scope:eqversion:5.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.35

Trust: 0.3

vendor:avayamodel:aura application server sip corescope:eqversion:53002.0

Trust: 0.3

vendor:avayamodel:meeting exchangescope:eqversion:5.0.0.52

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.438.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.39

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.536.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.20

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.23

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.462.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:15.0.874.120

Trust: 0.3

vendor:avayamodel:voice portalscope:eqversion:5.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.12

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.696.77

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.11

Trust: 0.3

vendor:avayamodel:ip office application serverscope:eqversion:8.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.368.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.209

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.37

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.46

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.77

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.307.10

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.226

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.87

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.46

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:17.0.96365

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.126

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.481.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.489.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.37

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:19

Trust: 0.3

vendor:avayamodel:aura messagingscope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.393.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.362.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.531.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.26

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.408.3

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.1.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.423.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.8

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.418.9

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.48

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:15.0.874.121

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:5.2

Trust: 0.3

vendor:susemodel:opensusescope:eqversion:12.1

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.323.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.356.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:16.0.912.77

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.93

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.23

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.370.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.380.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:13.0.782.112

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.447.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.216

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.408.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.344

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.512.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.419.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.408.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.66

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.48

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:6.1.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.361.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.58

Trust: 0.3

vendor:avayamodel:aura system platform sp1.1scope: - version: -

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.437.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.483.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.467.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.435.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.200

Trust: 0.3

vendor:redmodel:hat enterprise linux desktop optionalscope:eqversion:6

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:13.0.782.215

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.413.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.452.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.10

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.64

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.537.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.379.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.513.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.453.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:0.2.149.29

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:14.0.835.202

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.172.30

Trust: 0.3

vendor:avayamodel:meeting exchange sp1scope:eqversion:5.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.490.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.696.57

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.469.0

Trust: 0.3

vendor:avayamodel:conferencing standard editionscope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.49

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.334.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.408.9

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.307.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.55

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.303

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.506.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.458.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:18.0.1025.168

Trust: 0.3

vendor:debianmodel:linux ia-64scope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.404.0

Trust: 0.3

vendor:oraclemodel:enterprise linuxscope:eqversion:6.2

Trust: 0.3

vendor:avayamodel:voice portal sp1scope:eqversion:5.0

Trust: 0.3

vendor:applemodel:tvscope:eqversion:5.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.414.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.53

Trust: 0.3

vendor:avayamodel:voice portalscope:eqversion:5.1

Trust: 0.3

vendor:vmwaremodel:esxiscope:eqversion:5.0

Trust: 0.3

vendor:susemodel:linux enterprise server sp3 ltssscope:eqversion:10

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.494.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.335.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.484.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.85

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.328.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.342.5

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:12.2

Trust: 0.3

vendor:redmodel:hat enterprise linux server optionalscope:eqversion:6

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.360.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.211

Trust: 0.3

vendor:avayamodel:voice portal sp2scope:eqversion:5.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.18

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.482.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.479.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.381.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.19

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.15

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.104

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.12

Trust: 0.3

vendor:mandrivamodel:linux mandrake x86 64scope:eqversion:2011

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.394.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.41

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.511.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.437.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.503.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.415.0

Trust: 0.3

vendor:avayamodel:meeting exchange sp2scope:eqversion:5.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.364.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.521.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.507.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.520.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.349.0

Trust: 0.3

vendor:avayamodel:aura messagingscope:eqversion:6.0.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.528.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.408.7

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.458.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.450.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.350.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.418.7

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.322.2

Trust: 0.3

vendor:avayamodel:aura session manager sp1scope:eqversion:6.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.476.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.61

Trust: 0.3

vendor:avayamodel:iqscope:eqversion:5.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.17

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.20

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.63

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.35

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.354.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.345.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.325.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.215

Trust: 0.3

vendor:avayamodel:aura presence servicesscope:eqversion:6.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.31

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.335.4

Trust: 0.3

vendor:ubuntumodel:linux lts sparcscope:eqversion:8.04

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.22

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.431.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.10

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.369.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.347.0

Trust: 0.3

vendor:ubuntumodel:linux lts i386scope:eqversion:8.04

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.498.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.412.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.83

Trust: 0.3

vendor:susemodel:opensusescope:eqversion:11.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.34

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.16

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.307.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.42

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.406.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.302

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.310

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.515.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.416.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.63

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:16.0.91275

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.55

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.59

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.445.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.409.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.329.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.68

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:12.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.315.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.34

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.499.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.32

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.54

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.47

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.384.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.69

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.29

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.350.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.408.10

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.13

Trust: 0.3

vendor:avayamodel:meeting exchangescope:eqversion:5.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.26

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.422.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.511.2

Trust: 0.3

vendor:avayamodel:voice portal sp1scope:eqversion:5.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.61

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.36

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.529.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.503.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.24

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.9

Trust: 0.3

vendor:debianmodel:linux amd64scope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.33

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.371.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.408.8

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:13.0.782.107

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:14

Trust: 0.3

vendor:avayamodel:meeting exchange sp1scope:eqversion:5.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.411.0

Trust: 0.3

vendor:ubuntumodel:linux armscope:eqversion:10.04

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.452.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.202

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.496.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.363.0

Trust: 0.3

vendor:ubuntumodel:linux lts amd64scope:eqversion:12.04

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.367.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.454.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.453.0

Trust: 0.3

vendor:debianmodel:linux mipsscope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.466.6

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.337.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.696.68

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.507.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.96

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.366.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.36

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.43

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.91

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.42

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.80

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.473.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.441.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.8

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.60

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.549.0

Trust: 0.3

vendor:susemodel:linux enterprise server for vmware sp2scope:eqversion:11

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.88

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.466.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.314.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:18.0.1025.151

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.342.6

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.207

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.16

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.440.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.426.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.343.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.355.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.327.0

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:6.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.477.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.22

Trust: 0.3

vendor:avayamodel:aura system manager sp2scope:eqversion:6.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.67

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.65

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.401.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.516.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.335.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.356.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.430.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.493.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.11

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.457.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.21

Trust: 0.3

vendor:vmwaremodel:esxscope:eqversion:4.0

Trust: 0.3

vendor:mandrakesoftmodel:enterprise server x86 64scope:eqversion:5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.29

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:14.0.835.186

Trust: 0.3

vendor:avayamodel:aura communication managerscope:eqversion:5.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.308.0

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.1.3

Trust: 0.3

vendor:avayamodel:aura session manager sp2scope:eqversion:5.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.92

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.342.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:16.0.912.63

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.401.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.495.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.40

Trust: 0.3

vendor:slackwaremodel:linux x86 64 -currentscope: - version: -

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.522.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.30

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.356.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:9.0.597.94

Trust: 0.3

vendor:avayamodel:meeting exchangescope:eqversion:5.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.341.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.223

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.95

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.57

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.54

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.46

Trust: 0.3

vendor:vmwaremodel:esxi updatescope:eqversion:4.12

Trust: 0.3

vendor:susemodel:linux enterprise desktop sp4scope:eqversion:10

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.75

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.451.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.338.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.450.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.59

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.84

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.418.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.322.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.36

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.398.0

Trust: 0.3

vendor:avayamodel:iqscope:eqversion:5.1.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.404.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.531.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.480.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.466.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.536.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.418.6

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.94

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.19

Trust: 0.3

vendor:mandrakesoftmodel:enterprise serverscope:eqversion:5

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:5.2.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.28

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:13

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.466.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.30

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.4

Trust: 0.3

vendor:avayamodel:meeting exchangescope:eqversion:5.2

Trust: 0.3

vendor:avayamodel:aura communication manager utility servicesscope:eqversion:6.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.6

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.427.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:10.0.648.204

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.342.7

Trust: 0.3

vendor:vmwaremodel:esxscope:eqversion:4.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.466.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375125

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.551.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:10.0.648.128

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.18

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.19

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.301

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.172.43

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.544.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.500.1

Trust: 0.3

vendor:redmodel:hat enterprise linux desktop clientscope:eqversion:5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.39

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.307.8

Trust: 0.3

vendor:avayamodel:communication server 1000mscope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.14

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.336.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.61

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.222

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.98

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.342.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.317.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.696.65

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.320.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.21

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.65

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.12

Trust: 0.3

vendor:avayamodel:communication server 1000m signaling serverscope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.31

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.37

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.17

Trust: 0.3

vendor:redmodel:hat enterprise linux hpc node optionalscope:eqversion:6

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.366.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.33

Trust: 0.3

vendor:avayamodel:communication server 1000escope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.339.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.307.7

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.342.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.335.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.424.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:12.0.742.112

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.1.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.478.0

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:13.37

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.100

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.540.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.14

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.465.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.542.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.59

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.62

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.37599

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.330.0

Trust: 0.3

vendor:oraclemodel:enterprise linuxscope:eqversion:6

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.529.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.492.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.510.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:0.3.1549

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.410.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.79

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.27

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.45

Trust: 0.3

vendor:susemodel:linux enterprise sdk sp2scope:eqversion:11

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.547.1

Trust: 0.3

vendor:ubuntumodel:linux lts i386scope:eqversion:12.04

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.536.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.38

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.405.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.10

Trust: 0.3

vendor:avayamodel:aura system platformscope:eqversion:1.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.418.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.172.37

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.9

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.31

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.49

Trust: 0.3

vendor:mandrivamodel:linux mandrakescope:eqversion:2011

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.378.0

Trust: 0.3

vendor:ubuntumodel:linux lts lpiascope:eqversion:8.04

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.13

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:16

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:0.2.149.30

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.62

Trust: 0.3

vendor:avayamodel:aura presence servicesscope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.551.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.16

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.360.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.466.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.547.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.418.8

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.509.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.387.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.27

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.382.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.97

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.40

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.386.0

Trust: 0.3

vendor:avayamodel:aura system manager sp1scope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.425.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.485.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.486.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.450.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:12

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.48

Trust: 0.3

vendor:avayamodel:aura system manager sp1scope:eqversion:6.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.9

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.372.0

Trust: 0.3

vendor:avayamodel:aura system platformscope:eqversion:6.0.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.514.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.450.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.392.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.403.0

Trust: 0.3

vendor:debianmodel:linux s/390scope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.45

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.307.5

Trust: 0.3

vendor:avayamodel:communication server 1000m signaling serverscope:eqversion:7.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.212

Trust: 0.3

vendor:avayamodel:aura experience portalscope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.0

Trust: 0.3

vendor:applemodel:ipadscope:eqversion:0

Trust: 0.3

vendor:avayamodel:communication server 1000escope:eqversion:7.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.29

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.72

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:15.0.874102

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.206

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.360.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:10.0.648.133

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.6

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.26

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.51

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.2

Trust: 0.3

vendor:avayamodel:aura session manager sp1scope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.487.0

Trust: 0.3

vendor:redmodel:hat enterprise linux desktopscope:eqversion:6

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.19

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:17.0.963.46

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.404.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.332.0

Trust: 0.3

vendor:slackwaremodel:linux x86 64scope:eqversion:13.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.25

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.220

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.101

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:11.10

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.73

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.44

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.41

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:17.0.963.83

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.60

Trust: 0.3

vendor:avayamodel:aura session manager sp2scope:eqversion:6.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.340.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.436.0

Trust: 0.3

vendor:slackwaremodel:linux x86 64scope:eqversion:13.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.44

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.373.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.369.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.397.0

Trust: 0.3

vendor:debianmodel:linux armscope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.353.0

Trust: 0.3

vendor:avayamodel:aura presence servicesscope:eqversion:6.1.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.511.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.531.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.408.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.89

Trust: 0.3

vendor:centosmodel:centosscope:eqversion:5

Trust: 0.3

vendor:avayamodel:proactive contactscope:eqversion:5.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.70

Trust: 0.3

vendor:avayamodel:ip office application serverscope:eqversion:8.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.20

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.696.43

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:5.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.491.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.300

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.56

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.535.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.470.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.461.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.437.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.446.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.10

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.43

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.321.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.15

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.357.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.459.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.541.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.221

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.536.1

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:6.1.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.81

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:19.0.1084.52

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.333.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.313.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.475.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.524.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.351.0

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:6.1.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.102

Trust: 0.3

vendor:ubuntumodel:linux lts amd64scope:eqversion:8.04

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.17

Trust: 0.3

vendor:redmodel:hat enterprise linux workstation optionalscope:eqversion:6

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.307

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.471.0

Trust: 0.3

vendor:ubuntumodel:linux lts powerpcscope:eqversion:8.04

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.396.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.450.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.415.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.428.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.42

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.309.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.32

Trust: 0.3

vendor:susemodel:linux enterprise sdk sp4scope:eqversion:10

Trust: 0.3

vendor:slackwaremodel:linux x86 64scope:eqversion:13.37

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.205

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.16

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.447.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.460.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.344.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.307.9

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.204

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.342.9

Trust: 0.3

vendor:susemodel:linux enterprise desktop sp2scope:eqversion:11

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.13

Trust: 0.3

vendor:avayamodel:voice portalscope:eqversion:5.1.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.25

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.466.3

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.455.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.38

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.488.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.526.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.21

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.449.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:18.0.1025.142

Trust: 0.3

vendor:avayamodel:communication server 1000e signaling serverscope:eqversion:6.0

Trust: 0.3

vendor:avayamodel:aura messagingscope:eqversion:6.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.505.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.400.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.497.0

Trust: 0.3

vendor:slackwaremodel:linux -currentscope: - version: -

Trust: 0.3

vendor:avayamodel:aura system platform sp3scope:eqversion:6.0

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:13.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.172.33

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:6.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.103

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.224

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.369.2

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:5.2.2

Trust: 0.3

vendor:redmodel:hat enterprise linux serverscope:eqversion:5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.52

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.444.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.437.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.696.71

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.358.0

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:13.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.548.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.58

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:6.2

Trust: 0.3

vendor:centosmodel:centosscope:eqversion:6

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.360.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.24

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:5.2.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.456.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:12.0.742.91

Trust: 0.3

vendor:avayamodel:aura communication manager utility servicesscope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.36

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:17.0.963.78

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.17

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.308

Trust: 0.3

vendor:redmodel:hat enterprise linux workstationscope:eqversion:6

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.7

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.8

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:9.0.597.84

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.210

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.550.0

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:10.04

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.525.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.490.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.53

Trust: 0.3

vendor:gentoomodel:linuxscope: - version: -

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.317.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:17.0.963.56

Trust: 0.3

vendor:avayamodel:aura communication managerscope:eqversion:6.0.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.74

Trust: 0.3

vendor:redhatmodel:enterprise linux desktop workstation clientscope:eqversion:5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.495.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.432.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.314.0

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:5.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.500.0

Trust: 0.3

vendor:avayamodel:aura system platformscope:eqversion:6.0.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.309

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.214

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.324.0

Trust: 0.3

vendor:avayamodel:communication server 1000e signaling serverscope:eqversion:7.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.30

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.47

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.433.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.408.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.342.8

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.416.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.52

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:1.0

Trust: 0.3

vendor:debianmodel:linux ia-32scope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.201

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.172.31

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.11

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.32

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.22

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.672.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.14

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.43

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.78

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.354.1

Trust: 0.3

vendor:avayamodel:iqscope:eqversion:5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.504.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.316.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:14.0.835.163

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.44

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.90

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:10

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.418.3

Trust: 0.3

vendor:avayamodel:communication server 1000mscope:eqversion:7.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.304

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:18.0.1025.162

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11

Trust: 0.3

vendor:avayamodel:communication server 1000e signaling serverscope:eqversion:7.0

Trust: 0.3

vendor:avayamodel:aura communication manager utility servicesscope:eqversion:6.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.305

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.464.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.7

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.237

Trust: 0.3

vendor:debianmodel:linux powerpcscope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.53

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.41

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.418.4

Trust: 0.3

vendor:avayamodel:iqscope:eqversion:5.1

Trust: 0.3

vendor:redmodel:hat enterprise linux serverscope:eqversion:6

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.359.0

Trust: 0.3

vendor:vmwaremodel:esxiscope:eqversion:4.0

Trust: 0.3

vendor:avayamodel:communication server 1000m signaling serverscope:eqversion:7.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.383.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.376.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.465.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:10.0.648.205

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.306.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.33

Trust: 0.3

vendor:avayamodel:aura application server sip corescope:eqversion:53002.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.536.3

Trust: 0.3

vendor:avayamodel:communication server 1000escope:eqversion:7.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.37586

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.538.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.519.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.56

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.318.0

Trust: 0.3

vendor:avayamodel:communication server 1000mscope:eqversion:7.0

Trust: 0.3

sources: BID: 56684 // CNNVD: CNNVD-201211-518 // JVNDB: JVNDB-2012-005575 // NVD: CVE-2012-5134

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2012-5134
value: MEDIUM

Trust: 1.0

NVD: CVE-2012-5134
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201211-518
value: MEDIUM

Trust: 0.6

VULHUB: VHN-58415
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2012-5134
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-58415
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-58415 // CNNVD: CNNVD-201211-518 // JVNDB: JVNDB-2012-005575 // NVD: CVE-2012-5134

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-58415 // JVNDB: JVNDB-2012-005575 // NVD: CVE-2012-5134

THREAT TYPE

remote

Trust: 0.9

sources: PACKETSTORM: 118451 // PACKETSTORM: 123959 // PACKETSTORM: 118546 // CNNVD: CNNVD-201211-518

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-201211-518

CONFIGURATIONS

sources: JVNDB: JVNDB-2012-005575

PATCH

title:APPLE-SA-2013-10-22-8url:http://lists.apple.com/archives/security-announce/2013/Oct/msg00009.html

Trust: 0.8

title:APPLE-SA-2013-09-18-2url:http://lists.apple.com/archives/security-announce/2013/Sep/msg00006.html

Trust: 0.8

title:APPLE-SA-2013-09-20-1url:http://lists.apple.com/archives/security-announce/2013/Sep/msg00008.html

Trust: 0.8

title:HT6001url:http://support.apple.com/kb/HT6001

Trust: 0.8

title:HT5934url:http://support.apple.com/kb/HT5934

Trust: 0.8

title:HT5935url:http://support.apple.com/kb/HT5935

Trust: 0.8

title:HT5935url:http://support.apple.com/kb/HT5935?viewlocale=ja_JP

Trust: 0.8

title:HT6001url:http://support.apple.com/kb/HT6001?viewlocale=ja_JP

Trust: 0.8

title:HT5934url:http://support.apple.com/kb/HT5934?viewlocale=ja_JP

Trust: 0.8

title:DSA-2580url:http://www.debian.org/security/2012/dsa-2580

Trust: 0.8

title:Fix potential out of bound accessurl:http://git.gnome.org/browse/libxml2/commit/?id=6a36fbe3b3e001a8a840b5c1fdd81cefc9947f0d

Trust: 0.8

title:Stable Channel Updateurl:http://googlechromereleases.blogspot.jp/2012/11/stable-channel-update.html

Trust: 0.8

title:Google Chromeurl:http://www.google.co.jp/chrome/intl/ja/landing_ff_yt.html?hl=ja&hl=ja

Trust: 0.8

title:openSUSE-SU-2012:1637url:http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00004.html

Trust: 0.8

title:openSUSE-SU-2013:0178url:http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00023.html

Trust: 0.8

title:Bug 880466url:https://bugzilla.redhat.com/show_bug.cgi?id=880466

Trust: 0.8

title:RHSA-2012:1512url:http://rhn.redhat.com/errata/RHSA-2012-1512.html

Trust: 0.8

title:RHSA-2013:0217url:http://rhn.redhat.com/errata/RHSA-2013-0217.html

Trust: 0.8

title:MDVSA-2013:056url:http://www.mandriva.com/security/advisories?name=MDVSA-2013:056

Trust: 0.8

title:CVE-2012-5134 Buffer Overflow vulnerability in libxml2url:https://blogs.oracle.com/sunsecurity/entry/cve_2012_5134_buffer_overflow

Trust: 0.8

title:USN-1656-1url:http://www.ubuntu.com/usn/USN-1656-1

Trust: 0.8

title:Google Chrome_26.0.1410.64url:http://123.124.177.30/web/xxk/bdxqById.tag?id=45701

Trust: 0.6

sources: CNNVD: CNNVD-201211-518 // JVNDB: JVNDB-2012-005575

EXTERNAL IDS

db:NVDid:CVE-2012-5134

Trust: 3.5

db:BIDid:56684

Trust: 1.4

db:SECUNIAid:54886

Trust: 1.1

db:SECUNIAid:55568

Trust: 1.1

db:SECUNIAid:51448

Trust: 1.1

db:SECTRACKid:1027815

Trust: 1.1

db:JVNid:JVNVU98681940

Trust: 0.8

db:JVNid:JVNVU95174988

Trust: 0.8

db:JVNid:JVNVU94321146

Trust: 0.8

db:JVNDBid:JVNDB-2012-005575

Trust: 0.8

db:CNNVDid:CNNVD-201211-518

Trust: 0.7

db:AUSCERTid:ESB-2023.3732

Trust: 0.6

db:PACKETSTORMid:118533

Trust: 0.2

db:PACKETSTORMid:118451

Trust: 0.2

db:PACKETSTORMid:118546

Trust: 0.2

db:PACKETSTORMid:118639

Trust: 0.2

db:PACKETSTORMid:121130

Trust: 0.1

db:PACKETSTORMid:118674

Trust: 0.1

db:VULHUBid:VHN-58415

Trust: 0.1

db:PACKETSTORMid:123959

Trust: 0.1

db:PACKETSTORMid:119960

Trust: 0.1

db:SECUNIAid:51437

Trust: 0.1

db:PACKETSTORMid:118407

Trust: 0.1

db:PACKETSTORMid:123339

Trust: 0.1

sources: VULHUB: VHN-58415 // BID: 56684 // PACKETSTORM: 118451 // PACKETSTORM: 118639 // PACKETSTORM: 123959 // PACKETSTORM: 119960 // PACKETSTORM: 118533 // PACKETSTORM: 118407 // PACKETSTORM: 118546 // PACKETSTORM: 123339 // CNNVD: CNNVD-201211-518 // JVNDB: JVNDB-2012-005575 // NVD: CVE-2012-5134

REFERENCES

url:http://lists.apple.com/archives/security-announce/2013/sep/msg00006.html

Trust: 1.4

url:http://support.apple.com/kb/ht6001

Trust: 1.4

url:http://rhn.redhat.com/errata/rhsa-2012-1512.html

Trust: 1.2

url:http://rhn.redhat.com/errata/rhsa-2013-0217.html

Trust: 1.2

url:http://www.ubuntu.com/usn/usn-1656-1

Trust: 1.2

url:http://lists.apple.com/archives/security-announce/2013/oct/msg00009.html

Trust: 1.1

url:http://www.securityfocus.com/bid/56684

Trust: 1.1

url:http://git.gnome.org/browse/libxml2/commit/?id=6a36fbe3b3e001a8a840b5c1fdd81cefc9947f0d

Trust: 1.1

url:http://googlechromereleases.blogspot.com/2012/11/stable-channel-update.html

Trust: 1.1

url:http://support.apple.com/kb/ht5934

Trust: 1.1

url:https://bugzilla.redhat.com/show_bug.cgi?id=880466

Trust: 1.1

url:https://code.google.com/p/chromium/issues/detail?id=158249

Trust: 1.1

url:http://www.debian.org/security/2012/dsa-2580

Trust: 1.1

url:http://www.mandriva.com/security/advisories?name=mdvsa-2013:056

Trust: 1.1

url:http://www.securitytracker.com/id?1027815

Trust: 1.1

url:http://secunia.com/advisories/51448

Trust: 1.1

url:http://secunia.com/advisories/54886

Trust: 1.1

url:http://secunia.com/advisories/55568

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00002.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00004.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00023.html

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/80294

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-5134

Trust: 0.9

url:http://jvn.jp/vu/jvnvu94321146/

Trust: 0.8

url:http://jvn.jp/cert/jvnvu98681940/index.html

Trust: 0.8

url:http://jvn.jp/cert/jvnvu95174988/

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-5134

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2012-5134

Trust: 0.7

url:https://www.auscert.org.au/bulletins/esb-2023.3732

Trust: 0.6

url:https://blogs.oracle.com/sunsecurity/entry/cve_2012_5134_buffer_overflow

Trust: 0.3

url:http://www.google.com/chrome

Trust: 0.3

url:http://googlechromereleases.blogspot.ie/2012/11/stable-channel-update.html

Trust: 0.3

url:http://support.apple.com/kb/ht5935

Trust: 0.3

url:https://downloads.avaya.com/css/p8/documents/100170222

Trust: 0.3

url:http://www.vmware.com/security/advisories/vmsa-2013-0004.html

Trust: 0.3

url:https://downloads.avaya.com/css/p8/documents/100170918

Trust: 0.3

url:http://www.xerox.com/download/security/security-bulletin/12047-4e4eed8d42ca6/cert_xrx13-007_v1.0.pdf

Trust: 0.3

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.2

url:https://access.redhat.com/security/team/contact/

Trust: 0.2

url:https://access.redhat.com/security/team/key/#package

Trust: 0.2

url:https://www.redhat.com/security/data/cve/cve-2012-5134.html

Trust: 0.2

url:http://bugzilla.redhat.com/):

Trust: 0.2

url:https://access.redhat.com/knowledge/articles/11258

Trust: 0.2

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2012-2871

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2012-0841

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2011-3102

Trust: 0.2

url:https://launchpad.net/ubuntu/+source/libxml2/2.8.0+dfsg1-5ubuntu2.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/libxml2/2.7.8.dfsg-4ubuntu0.5

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/libxml2/2.6.31.dfsg-2ubuntu1.11

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/libxml2/2.7.8.dfsg-5.1ubuntu4.3

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/libxml2/2.7.6.dfsg-1ubuntu1.7

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0338

Trust: 0.1

url:http://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5134

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1664

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0338

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-2877

Trust: 0.1

url:http://security.gentoo.org/glsa/glsa-201311-06.xml

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1969

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2877

Trust: 0.1

url:http://security.gentoo.org/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1664

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1969

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-2871

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2011-2834.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-2834

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2010-4494.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3919

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3905

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-4008

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-1944

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2011-3102.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2011-1944.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2011-3919.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-4494

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2011-2821.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2011-3905.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-0216

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-2821

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2012-0841.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2011-0216.html

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2010-4008.html

Trust: 0.1

url:http://www.debian.org/security/faq

Trust: 0.1

url:http://www.debian.org/security/

Trust: 0.1

url:http://googlechromereleases.blogspot.dk/2012/11/stable-channel-update.html

Trust: 0.1

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/51437/#comments

Trust: 0.1

url:http://secunia.com/blog/325/

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=51437

Trust: 0.1

url:http://secunia.com/advisories/51437/

Trust: 0.1

url:http://www.mandriva.com/security/advisories

Trust: 0.1

url:http://www.mandriva.com/security/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0997

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0996

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0879

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1000

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1010

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1001

Trust: 0.1

url:http://support.apple.com/kb/ht1222

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0995

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0992

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1003

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1005

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-2391

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2807

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1002

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2825

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0993

Trust: 0.1

url:https://www.apple.com/support/security/pgp/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2870

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1004

Trust: 0.1

url:http://gpgtools.org

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0991

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0999

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0994

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1007

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0998

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1006

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1008

Trust: 0.1

sources: VULHUB: VHN-58415 // BID: 56684 // PACKETSTORM: 118451 // PACKETSTORM: 118639 // PACKETSTORM: 123959 // PACKETSTORM: 119960 // PACKETSTORM: 118533 // PACKETSTORM: 118407 // PACKETSTORM: 118546 // PACKETSTORM: 123339 // CNNVD: CNNVD-201211-518 // JVNDB: JVNDB-2012-005575 // NVD: CVE-2012-5134

CREDITS

miaubiz, Atte Kettunen of OUSPG, and Fermin Serna of Google Security Team, Justin Drake,J??ri Aedla and Inferno of Google Chrome Security Team, Attila Sz??sz

Trust: 0.6

sources: CNNVD: CNNVD-201211-518

SOURCES

db:VULHUBid:VHN-58415
db:BIDid:56684
db:PACKETSTORMid:118451
db:PACKETSTORMid:118639
db:PACKETSTORMid:123959
db:PACKETSTORMid:119960
db:PACKETSTORMid:118533
db:PACKETSTORMid:118407
db:PACKETSTORMid:118546
db:PACKETSTORMid:123339
db:CNNVDid:CNNVD-201211-518
db:JVNDBid:JVNDB-2012-005575
db:NVDid:CVE-2012-5134

LAST UPDATE DATE

2025-12-22T23:07:45.364000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-58415date:2017-08-29T00:00:00
db:BIDid:56684date:2015-04-16T18:08:00
db:CNNVDid:CNNVD-201211-518date:2023-06-30T00:00:00
db:JVNDBid:JVNDB-2012-005575date:2014-02-03T00:00:00
db:NVDid:CVE-2012-5134date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:VULHUBid:VHN-58415date:2012-11-28T00:00:00
db:BIDid:56684date:2012-11-26T00:00:00
db:PACKETSTORMid:118451date:2012-11-30T03:11:59
db:PACKETSTORMid:118639date:2012-12-05T23:55:22
db:PACKETSTORMid:123959date:2013-11-11T23:02:01
db:PACKETSTORMid:119960date:2013-02-01T03:30:19
db:PACKETSTORMid:118533date:2012-12-03T01:27:47
db:PACKETSTORMid:118407date:2012-11-27T07:16:54
db:PACKETSTORMid:118546date:2012-12-03T02:00:31
db:PACKETSTORMid:123339date:2013-09-20T20:54:13
db:CNNVDid:CNNVD-201211-518date:2012-11-28T00:00:00
db:JVNDBid:JVNDB-2012-005575date:2012-11-29T00:00:00
db:NVDid:CVE-2012-5134date:2012-11-28T01:55:01.323