ID

VAR-200609-1553


CVE

CVE-2006-4340


TITLE

OpenSSL SSLv2 client code fails to properly check for NULL

Trust: 0.8

sources: CERT/CC: VU#386964

DESCRIPTION

Mozilla Network Security Service (NSS) library before 3.11.3, as used in Mozilla Firefox before 1.5.0.7, Thunderbird before 1.5.0.7, and SeaMonkey before 1.0.5, when using an RSA key with exponent 3, does not properly handle extra data in a signature, which allows remote attackers to forge signatures for SSL/TLS and email certificates, a similar vulnerability to CVE-2006-4339. NOTE: on 20061107, Mozilla released an advisory stating that these versions were not completely patched by MFSA2006-60. The newer fixes for 1.5.0.7 are covered by CVE-2006-5462. A flaw in the OpenSSL library could allow a remote attacker to cause a denial of service on an affected application. The gzip program contains a buffer overflow vulnerability that may allow an attacker to execute arbitrary code or create a denial-of-service condition. Multiple RSA implementations fail to properly handle RSA signatures. This vulnerability may allow an attacker to forge RSA signatures. An attacker may exploit this issue to sign digital certificates or RSA keys and take advantage of trust relationships that depend on these credentials, possibly posing as a trusted party and signing a certificate or key. All versions prior to and including OpenSSL 0.9.7j and 0.9.8b are affected by this vulnerability. Updates are available. Background ========== The Mozilla Network Security Service is a library implementing security features like SSL v.2/v.3, TLS, PKCS #5, PKCS #7, PKCS #11, PKCS #12, S/MIME and X.509 certificates. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 dev-libs/nss < 3.11.3 >= 3.11.3 Description =========== Daniel Bleichenbacher discovered that it might be possible to forge signatures signed by RSA keys with the exponent of 3. This impacts any software using the NSS library, like the Mozilla products Firefox, Thunderbird and Seamonkey. http://creativecommons.org/licenses/by-sa/2.5 . ---------------------------------------------------------------------- Want to work within IT-Security? Secunia is expanding its team of highly skilled security experts. We will help with relocation and obtaining a work permit. Currently the following type of positions are available: http://secunia.com/quality_assurance_analyst/ http://secunia.com/web_application_security_specialist/ http://secunia.com/hardcore_disassembler_and_reverse_engineer/ ---------------------------------------------------------------------- TITLE: gzip Multiple Vulnerabilities SECUNIA ADVISORY ID: SA21996 VERIFY ADVISORY: http://secunia.com/advisories/21996/ CRITICAL: Moderately critical IMPACT: DoS, System access WHERE: >From remote SOFTWARE: gzip 1.x http://secunia.com/product/4220/ DESCRIPTION: Tavis Ormandy has reported some vulnerabilities in gzip, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. 1) A boundary error within the "make_table()" function in unlzh.c can be used to modify certain stack data. tricking a user or automated system into unpacking a specially crafted archive file. tricking a user or automated system into unpacking a specially crafted "pack" archive file. 3) A buffer overflow within the "make_table()" function of gzip's LZH support can be exploited to cause a DoS and potentially to compromise a vulnerable system by e.g. tricking a user or automated system into unpacking an archive containing a specially crafted decoding table. 4) A NULL pointer dereference within the "huft_build()" function and an infinite loop within the LZH handling can be exploited to cause a DoS by e.g. tricking a user or automated system into unpacking a specially crafted archive file. The vulnerabilities have been reported in version 1.3.5. SOLUTION: Do not unpack untrusted archive files. PROVIDED AND/OR DISCOVERED BY: Tavis Ormandy, Google Security Team ORIGINAL ADVISORY: http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=204676 OTHER REFERENCES: US-CERT VU#554780: http://www.kb.cert.org/vuls/id/554780 US-CERT VU#381508: http://www.kb.cert.org/vuls/id/381508 US-CERT VU#773548: http://www.kb.cert.org/vuls/id/773548 US-CERT VU#933712: http://www.kb.cert.org/vuls/id/933712 US-CERT VU#596848 http://www.kb.cert.org/vuls/id/596848 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - -------------------------------------------------------------------------- Debian Security Advisory DSA 1192-1 security@debian.org http://www.debian.org/security/ Martin Schulze October 6th, 2006 http://www.debian.org/security/faq - -------------------------------------------------------------------------- Package : mozilla Vulnerability : several Problem type : remote Debian-specific: no CVE IDs : CVE-2006-2788 CVE-2006-4340 CVE-2006-4565 CVE-2006-4566 CVE-2006-4568 CVE-2006-4570 CVE-2006-4571 BugTraq ID : 20042 Several security related problems have been discovered in Mozilla and derived products. CVE-2006-4340 Daniel Bleichenbacher recently described an implementation error in RSA signature verification that cause the application to incorrectly trust SSL certificates. CVE-2006-4570 Georgi Guninski demonstrated that even with JavaScript disabled in mail (the default) an attacker can still execute JavaScript when a mail message is viewed, replied to, or forwarded. For the stable distribution (sarge) these problems have been fixed in version 1.7.8-1sarge7.3.1. We recommend that you upgrade your Mozilla package. Upgrade Instructions - -------------------- wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given at the end of this advisory: apt-get update will update the internal database apt-get upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. Debian GNU/Linux 3.1 alias sarge - -------------------------------- Source archives: http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.3.1.dsc Size/MD5 checksum: 1131 d15b48d8e6d5bb470cffefdb98fd8c58 http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.3.1.diff.gz Size/MD5 checksum: 565099 9539b911c438e419cee16fdce5ccebb1 http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8.orig.tar.gz Size/MD5 checksum: 30589520 13c0f0331617748426679e8f2e9f537a Alpha architecture: http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge7.3.1_alpha.deb Size/MD5 checksum: 168064 ebdd93280990a822fe619b20d2c5651b http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge7.3.1_alpha.deb Size/MD5 checksum: 147992 527d6cfc2f148b2b57a5710e927d2f7d http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge7.3.1_alpha.deb Size/MD5 checksum: 184944 6b61d08d769e011cbd2c90e8fb45c13b http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge7.3.1_alpha.deb Size/MD5 checksum: 857794 f734aa2ccf548cd02f29c41af248191b http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.3.1_alpha.deb Size/MD5 checksum: 1038 03fa5f515ce9cf9ee8b6909112e67241 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge7.3.1_alpha.deb Size/MD5 checksum: 11492210 6370fe9a4502211f03d1c556db10a9a9 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge7.3.1_alpha.deb Size/MD5 checksum: 403278 be6c2e243d2690311b9ebd3f39d0699d http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge7.3.1_alpha.deb Size/MD5 checksum: 158336 6e0d851b64e2eef0a971ec836bf1d8be http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge7.3.1_alpha.deb Size/MD5 checksum: 3358952 739167a1d53ef3fea8d48ac68a0ff985 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge7.3.1_alpha.deb Size/MD5 checksum: 122296 6fdf00b74974a4e264d5ad8cc211d10a http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge7.3.1_alpha.deb Size/MD5 checksum: 204154 17bc334d8f76a7f53f4e1bf8487dc47a http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge7.3.1_alpha.deb Size/MD5 checksum: 1937186 381885d5a06821864c32f351b37dc906 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge7.3.1_alpha.deb Size/MD5 checksum: 212632 bb11ae317c16108ca9320317eef099c7 AMD64 architecture: http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge7.3.1_amd64.deb Size/MD5 checksum: 168068 a6ec123adfd2fcbf9408596b5c73b9d4 http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge7.3.1_amd64.deb Size/MD5 checksum: 147080 9152fff3ba0fbf2a2bf5460d8c96cb5f http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge7.3.1_amd64.deb Size/MD5 checksum: 184956 524afa513ee220128c8524c1205ef8f5 http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge7.3.1_amd64.deb Size/MD5 checksum: 715998 08791e74ecdf20de41e5f19d94a716ca http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.3.1_amd64.deb Size/MD5 checksum: 1036 6742c0d8e01ba7280ee2517b02a0692a http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge7.3.1_amd64.deb Size/MD5 checksum: 10958842 2dd4d59281c666921689dab18cc97a7f http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge7.3.1_amd64.deb Size/MD5 checksum: 403286 ae407a2bc00ed600a3e4381bf4b2f5fa http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge7.3.1_amd64.deb Size/MD5 checksum: 158332 9dc4bdb8e22d6a43a426768e1159465a http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge7.3.1_amd64.deb Size/MD5 checksum: 3352976 007632e26f24148508945746e9b38808 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge7.3.1_amd64.deb Size/MD5 checksum: 121182 0b6333f64e2c554b0714ab2300a231f2 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge7.3.1_amd64.deb Size/MD5 checksum: 204176 ddf17971c28fb17165bc67136e899437 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge7.3.1_amd64.deb Size/MD5 checksum: 1936044 5595ca57ce7bad38f20e8d096e263719 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge7.3.1_amd64.deb Size/MD5 checksum: 204450 d2da3c40abbd17b414db5eae5075dbd5 ARM architecture: http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge7.3.1_arm.deb Size/MD5 checksum: 168072 ff2516439a6a9142f390711efb348ad8 http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge7.3.1_arm.deb Size/MD5 checksum: 125426 a4c096f68b567473cedf980a41b7841e http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge7.3.1_arm.deb Size/MD5 checksum: 184972 958ce2289c9f9001c05c6fcbcb5c8a71 http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge7.3.1_arm.deb Size/MD5 checksum: 633292 f9ae3102e3e1db4c7193cc647108affc http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.3.1_arm.deb Size/MD5 checksum: 1038 c615211b7d148e6914ccc8206ae72269 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge7.3.1_arm.deb Size/MD5 checksum: 9220338 f018149aeceba69d07abd6ccf40511f8 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge7.3.1_arm.deb Size/MD5 checksum: 403324 791115daa9842a854c101152b2aa53e8 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge7.3.1_arm.deb Size/MD5 checksum: 158364 ea384cea48bab4655a5b155b670dcbbe http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge7.3.1_arm.deb Size/MD5 checksum: 3342410 147a1d3e30e68d492d1606d8f5b75e8b http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge7.3.1_arm.deb Size/MD5 checksum: 112668 151c1100ded9a89a7dca01496f657bde http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge7.3.1_arm.deb Size/MD5 checksum: 204172 ed28f22bc9063cd418041f1212cc3a01 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge7.3.1_arm.deb Size/MD5 checksum: 1604524 311d5cd9eaab1aaa9bb10ec44f1b43b8 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge7.3.1_arm.deb Size/MD5 checksum: 169016 e827fe7370f7f3766230765c66e1b9ed HP Precision architecture: http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge7.3.1_hppa.deb Size/MD5 checksum: 168070 64581dd9cc92cd679ee2fc0ee61db9f5 http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge7.3.1_hppa.deb Size/MD5 checksum: 157996 716faceb18fb7018141b84f51c6503a7 http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge7.3.1_hppa.deb Size/MD5 checksum: 184952 10cf87ce4aac77800d045012455f52b7 http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge7.3.1_hppa.deb Size/MD5 checksum: 756042 44e58475246ab2da5fce46332b9bed8f http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.3.1_hppa.deb Size/MD5 checksum: 1042 5cbd847400e085f61ce114727dc400e6 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge7.3.1_hppa.deb Size/MD5 checksum: 12176912 0d2a27beadca59f8eb2102d1a032b351 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge7.3.1_hppa.deb Size/MD5 checksum: 403290 0640f6da79eab04ce3fb60f52f235763 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge7.3.1_hppa.deb Size/MD5 checksum: 158358 c748bbf13608c462fa51a7c200344324 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge7.3.1_hppa.deb Size/MD5 checksum: 3359202 f9182415beea6800a2799ef66853f001 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge7.3.1_hppa.deb Size/MD5 checksum: 123514 efafd42607f1d4219906f39f1153f56d http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge7.3.1_hppa.deb Size/MD5 checksum: 204170 5f500679a2fbb03620fe96e5a9e66615 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge7.3.1_hppa.deb Size/MD5 checksum: 2135248 fbdad52922d54cbbd93b2c07435f114b http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge7.3.1_hppa.deb Size/MD5 checksum: 216440 bfbe9cda6e01d1f17872512935be0699 Intel IA-32 architecture: http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge7.3.1_i386.deb Size/MD5 checksum: 170352 93c0132757c2f5927cbcd3edbc6c50e1 http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge7.3.1_i386.deb Size/MD5 checksum: 137902 746c7c10db2d40314da82cfbfe68b21b http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge7.3.1_i386.deb Size/MD5 checksum: 187134 448048f13343dd917bf8e5b4aebc9c6c http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge7.3.1_i386.deb Size/MD5 checksum: 662738 c6c6a485eddccd6827e459d5a3ef1802 http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.3.1_i386.deb Size/MD5 checksum: 1032 7dba2a502de330766b38b3de3415bb96 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge7.3.1_i386.deb Size/MD5 checksum: 10349414 3433a083e8caf92aeccd640fa8e3051c http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge7.3.1_i386.deb Size/MD5 checksum: 403516 f2bf1fe26de0867f652d0279ee09a2ce http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge7.3.1_i386.deb Size/MD5 checksum: 158364 5efe6a701d8ec73f9b68c99f6ed8743a http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge7.3.1_i386.deb Size/MD5 checksum: 3595032 20d25e4e398ee8e061023c051202ead0 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge7.3.1_i386.deb Size/MD5 checksum: 116690 832936b80e72faa976f9b88cf7bbce1e http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge7.3.1_i386.deb Size/MD5 checksum: 204166 8232c7007d5674ec81cadb21e1152192 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge7.3.1_i386.deb Size/MD5 checksum: 1816124 d86ab51a3bae24c0c15812c09a6d5aca http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge7.3.1_i386.deb Size/MD5 checksum: 192792 f6aa69247beb6d659fceeda712570211 Intel IA-64 architecture: http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge7.3.1_ia64.deb Size/MD5 checksum: 168064 c7e380c8c28cb27c75f0eb4f5308ce0f http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge7.3.1_ia64.deb Size/MD5 checksum: 175418 51df9210069ec76233e987faf7332f73 http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge7.3.1_ia64.deb Size/MD5 checksum: 184940 fa8414c133c69fcbc757eb5a973fd619 http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge7.3.1_ia64.deb Size/MD5 checksum: 968238 1325acd2d3c6cd55da5862c4cc37c7e7 http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.3.1_ia64.deb Size/MD5 checksum: 1034 7cb96d17eca85528e75571e908eea762 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge7.3.1_ia64.deb Size/MD5 checksum: 12965968 c806fe57cad11be3e517ae32a9bf8a74 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge7.3.1_ia64.deb Size/MD5 checksum: 403278 38b8e1dee5235aba18f4481e8358e17a http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge7.3.1_ia64.deb Size/MD5 checksum: 158342 92e3349223f0ce8018df4a5e3dd3d284 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge7.3.1_ia64.deb Size/MD5 checksum: 3378668 afbbe0a2a0388afa336f0fa5b2e9b375 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge7.3.1_ia64.deb Size/MD5 checksum: 125586 f628ec3a2a0e9ffd882349a4748b5bb5 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge7.3.1_ia64.deb Size/MD5 checksum: 204164 b64822e5541dbf9ce18c25c3c57a727c http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge7.3.1_ia64.deb Size/MD5 checksum: 2302358 89a93b8c9f670c25508881335159d695 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge7.3.1_ia64.deb Size/MD5 checksum: 242930 62fc9a87649de2ecef2a39542c470857 Motorola 680x0 architecture: http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge7.3.1_m68k.deb Size/MD5 checksum: 168078 c3b7aa1b816f29a98e4a111cb8eee55b http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge7.3.1_m68k.deb Size/MD5 checksum: 127086 70b2e18c48d5fa16a42ea2c230841434 http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge7.3.1_m68k.deb Size/MD5 checksum: 184992 b243567f7524c97f6d32ef7acfd419cd http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge7.3.1_m68k.deb Size/MD5 checksum: 601300 39d6c017e68ea837f0ce4da5fed30499 http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.3.1_m68k.deb Size/MD5 checksum: 1044 70236bff1f5c7409fa727dbb9125aaa0 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge7.3.1_m68k.deb Size/MD5 checksum: 9717226 5ba4f9b972b837b6007874872dd3b352 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge7.3.1_m68k.deb Size/MD5 checksum: 403386 fff7cf6c197cb493e92daf6d41d26e34 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge7.3.1_m68k.deb Size/MD5 checksum: 158420 701da929538dad73aec9fdc68cdcf749 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge7.3.1_m68k.deb Size/MD5 checksum: 3338098 a046f1d0df0784228383a9e8406d7a65 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge7.3.1_m68k.deb Size/MD5 checksum: 114484 669b9051c0991e44bda2db410c91cb95 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge7.3.1_m68k.deb Size/MD5 checksum: 204216 99c53a9c2f2350a4a1a9d39c78054047 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge7.3.1_m68k.deb Size/MD5 checksum: 1683242 aa2ed286b86606c51481d4a51729b1f9 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge7.3.1_m68k.deb Size/MD5 checksum: 175022 504150e924b5ad04892b29e06646d9e5 Big endian MIPS architecture: http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge7.3.1_mips.deb Size/MD5 checksum: 168068 986e98f644a1ce7e41c8b66ea64a78d3 http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge7.3.1_mips.deb Size/MD5 checksum: 141958 9d48c8ead5b703ec59e151fe015017a9 http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge7.3.1_mips.deb Size/MD5 checksum: 184944 8c22e740e0f30065e3e2555470a7400e http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge7.3.1_mips.deb Size/MD5 checksum: 727008 4eb13d18c10aba6970877152605932d6 http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.3.1_mips.deb Size/MD5 checksum: 1042 a03a2cb21c195c0be9fddc05bc36ae2a http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge7.3.1_mips.deb Size/MD5 checksum: 10738234 765f082c174e71fcf336a1a05d4da21e http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge7.3.1_mips.deb Size/MD5 checksum: 403294 321aad797e8afc4d201f2e2f5b2aa451 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge7.3.1_mips.deb Size/MD5 checksum: 158346 83a396e806b4d7d0f488081d0f573adf http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge7.3.1_mips.deb Size/MD5 checksum: 3358822 e9c2a6ec923da290335ca1251b871ea3 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge7.3.1_mips.deb Size/MD5 checksum: 117644 1b60a2916cd066c5e8ee1bc615b549ba http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge7.3.1_mips.deb Size/MD5 checksum: 204164 0b7ec0de758949ede920d1fda470b406 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge7.3.1_mips.deb Size/MD5 checksum: 1795554 1ecdca7f3d0175d64d1320cccb3e4c97 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge7.3.1_mips.deb Size/MD5 checksum: 190110 d507d038190177f2a07a236770596b43 Little endian MIPS architecture: http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge7.3.1_mipsel.deb Size/MD5 checksum: 168076 daeb11c43fcdae32f8107fc870d413ea http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge7.3.1_mipsel.deb Size/MD5 checksum: 141908 58052e46884d461b22cf6308183d8104 http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge7.3.1_mipsel.deb Size/MD5 checksum: 184954 793c3b33874d48779520cbb302ccf07d http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge7.3.1_mipsel.deb Size/MD5 checksum: 716464 ca48760ff0f4621ee9562aa839358520 http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.3.1_mipsel.deb Size/MD5 checksum: 1042 9f3f22a5debbcc2e8dfc009d97e35d2e http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge7.3.1_mipsel.deb Size/MD5 checksum: 10617798 9fde4aa43c30493758af5c0d27248a85 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge7.3.1_mipsel.deb Size/MD5 checksum: 403288 15fd9ac211379c4a53d1a00002f1954d http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge7.3.1_mipsel.deb Size/MD5 checksum: 158330 62e83130300fef744be42b911f872701 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge7.3.1_mipsel.deb Size/MD5 checksum: 3359560 9af2ab0f437e08b5936c7cd56a181b63 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge7.3.1_mipsel.deb Size/MD5 checksum: 117204 2c2503930b8b58af5e74ad2d1270591d http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge7.3.1_mipsel.deb Size/MD5 checksum: 204156 0bb224941755465b55ff6df8cec8cfcb http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge7.3.1_mipsel.deb Size/MD5 checksum: 1777612 cbcf8085e6ec3a7ba97b0e751b5345c4 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge7.3.1_mipsel.deb Size/MD5 checksum: 187622 9bc6ba814ade0445aff6d5a9c4d3a696 PowerPC architecture: http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge7.3.1_powerpc.deb Size/MD5 checksum: 168074 d7b4a7c5bbe3baac5133c3fa1a265e07 http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge7.3.1_powerpc.deb Size/MD5 checksum: 132428 774701aa5761a72b48719cc3c90b95e7 http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge7.3.1_powerpc.deb Size/MD5 checksum: 184956 7b79f2e6d9d4cba7c9b8ab88b2232604 http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge7.3.1_powerpc.deb Size/MD5 checksum: 720214 ef13301949fb2cb87c0f2464220bfad0 http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.3.1_powerpc.deb Size/MD5 checksum: 1042 b11e9180cd97514ea791541dc51c6e5d http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge7.3.1_powerpc.deb Size/MD5 checksum: 9711648 8c107826f2ec6cca249be5f1042dea0e http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge7.3.1_powerpc.deb Size/MD5 checksum: 403292 12e27826c444ab1f8c5afd88f154fbcb http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge7.3.1_powerpc.deb Size/MD5 checksum: 158356 affeb35493057105a7dfd89bba5d40dd http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge7.3.1_powerpc.deb Size/MD5 checksum: 3341204 ad03912ca42d8d14ab7b269e30c444b1 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge7.3.1_powerpc.deb Size/MD5 checksum: 114582 3c198af3d33673a9d6f2e7c1cec00e4f http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge7.3.1_powerpc.deb Size/MD5 checksum: 204176 a6d09e9b630d9210a1cf1ffbc81c8569 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge7.3.1_powerpc.deb Size/MD5 checksum: 1643154 2d343f903c492177885ee167aa89eb7a http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge7.3.1_powerpc.deb Size/MD5 checksum: 175816 8e2eddbd5631017cb725b69e1e493143 IBM S/390 architecture: http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge7.3.1_s390.deb Size/MD5 checksum: 168072 181bd53f98bae36e2c65617f7d19d3dd http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge7.3.1_s390.deb Size/MD5 checksum: 157706 4841fbcddea3c973c0e58f650b02be0a http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge7.3.1_s390.deb Size/MD5 checksum: 184944 3676098265fe184b29eeaeb5600fb0b0 http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge7.3.1_s390.deb Size/MD5 checksum: 800404 d59043ee3f8de6109ded310eb2676caa http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.3.1_s390.deb Size/MD5 checksum: 1038 f2edb972286fb96d781b6eedda318047 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge7.3.1_s390.deb Size/MD5 checksum: 11339772 1d4d0d4737b0da240db0aa3d64f740de http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge7.3.1_s390.deb Size/MD5 checksum: 403280 4a628c6906de57be839683efc0e75385 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge7.3.1_s390.deb Size/MD5 checksum: 158330 d948a64b56af65bcef8ea69095d2c7f0 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge7.3.1_s390.deb Size/MD5 checksum: 3353612 fdd6c8b25715b6bd4a19afa9a1f6d6de http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge7.3.1_s390.deb Size/MD5 checksum: 121366 c9a927eaf8fdd5e81ec5e4ccd65cbfcc http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge7.3.1_s390.deb Size/MD5 checksum: 204170 db1baf6a69237d2ad992312f7e49e06f http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge7.3.1_s390.deb Size/MD5 checksum: 1944792 7c2ccc266fed2030012e957b1e8468b5 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge7.3.1_s390.deb Size/MD5 checksum: 213644 610bee894928b26d2b807525e5cae97e Sun Sparc architecture: http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge7.3.1_sparc.deb Size/MD5 checksum: 168068 6fcfd42726a291edb1cfd61e2f11a984 http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge7.3.1_sparc.deb Size/MD5 checksum: 129660 f339731cd85d092184e8d645692b6a46 http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge7.3.1_sparc.deb Size/MD5 checksum: 184956 753e6c5c8897c8b295069be4aedcc55b http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge7.3.1_sparc.deb Size/MD5 checksum: 674042 57126ff0e746ea6353e94c9cd12f19de http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.3.1_sparc.deb Size/MD5 checksum: 1040 c67300bde176389372c7fc1c165f5976 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge7.3.1_sparc.deb Size/MD5 checksum: 9384000 d747594bfa533f6df4021ec0230289f2 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge7.3.1_sparc.deb Size/MD5 checksum: 403286 4be3db86d8867bb882fee94008bc5246 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge7.3.1_sparc.deb Size/MD5 checksum: 158348 549784d01068073683bc83977403e545 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge7.3.1_sparc.deb Size/MD5 checksum: 3342172 b6572f524ddc2f0a90cb1b57ef53066a http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge7.3.1_sparc.deb Size/MD5 checksum: 112514 8dfad0f1400d292cafe84da604f849d8 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge7.3.1_sparc.deb Size/MD5 checksum: 204154 a09ecfc644a8bbb0f8a6d333afbc6b59 http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge7.3.1_sparc.deb Size/MD5 checksum: 1583764 1d3bca34a075297f04f503831eea979c http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge7.3.1_sparc.deb Size/MD5 checksum: 168194 ad23c724cea9ef75bde64e0d5565e791 These files will probably be moved into the stable distribution on its next update. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ . This update provides the latest Firefox to correct these issues. _______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4253 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4340 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4565 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4566 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4567 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4568 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4569 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4571 http://www.mozilla.org/security/announce/2006/mfsa2006-57.html http://www.mozilla.org/security/announce/2006/mfsa2006-58.html http://www.mozilla.org/security/announce/2006/mfsa2006-59.html http://www.mozilla.org/security/announce/2006/mfsa2006-60.html http://www.mozilla.org/security/announce/2006/mfsa2006-61.html http://www.mozilla.org/security/announce/2006/mfsa2006-62.html http://www.mozilla.org/security/announce/2006/mfsa2006-64.html _______________________________________________________________________ Updated Packages: Mandriva Linux 2006.0: 4e750ef25e44a1b493d2a61ad5f9a7a2 2006.0/i586/devhelp-0.10-7.2.20060mdk.i586.rpm e6cd690c11d4e8f352d2ce7bf0f7d4be 2006.0/i586/epiphany-1.8.5-4.2.20060mdk.i586.rpm b2f094942eca657f3dc7a8699cb8b776 2006.0/i586/epiphany-devel-1.8.5-4.2.20060mdk.i586.rpm c4ae8fc253aa1fe055ec4c1560205fab 2006.0/i586/epiphany-extensions-1.8.2-3.2.20060mdk.i586.rpm 08cde29a26e6ac2d0e3b629f660db9fe 2006.0/i586/galeon-2.0.1-1.2.20060mdk.i586.rpm 9c94b904a9f2c64090328edd73d0e1fa 2006.0/i586/libdevhelp-1_0-0.10-7.2.20060mdk.i586.rpm b5ad67818794371f50d63a611c79b45b 2006.0/i586/libdevhelp-1_0-devel-0.10-7.2.20060mdk.i586.rpm fe0707524f8f3b4e1dcfe80c8bec0190 2006.0/i586/libnspr4-1.5.0.7-0.1.20060mdk.i586.rpm 770e8d6c5643c78f486ae2c115f7c740 2006.0/i586/libnspr4-devel-1.5.0.7-0.1.20060mdk.i586.rpm ffb123d21760cbba92a232dfb1150b7e 2006.0/i586/libnspr4-static-devel-1.5.0.7-0.1.20060mdk.i586.rpm fafbff86e6f1d44b7d1ad3e5f1f24860 2006.0/i586/libnss3-1.5.0.7-0.1.20060mdk.i586.rpm 41c8df68fb4c2d8d37440d1dea73f8c6 2006.0/i586/libnss3-devel-1.5.0.7-0.1.20060mdk.i586.rpm 2596f8b787cea221c80a85fd0854f766 2006.0/i586/mozilla-firefox-1.5.0.7-0.1.20060mdk.i586.rpm c912e48bd5138b8f42b24b3c34653a19 2006.0/i586/mozilla-firefox-ar-1.5.0.7-0.1.20060mdk.i586.rpm 1a82466395715237df552070e51f6525 2006.0/i586/mozilla-firefox-bg-1.5.0.7-0.1.20060mdk.i586.rpm 514de0cacb2462a8a6a26206ac18b617 2006.0/i586/mozilla-firefox-br-1.5.0.7-0.1.20060mdk.i586.rpm 70415104d0814a6e94c1997c0c464957 2006.0/i586/mozilla-firefox-ca-1.5.0.7-0.1.20060mdk.i586.rpm c2b5a360abd1a8a3e78dd8e9df072b4c 2006.0/i586/mozilla-firefox-cs-1.5.0.7-0.1.20060mdk.i586.rpm f8dd2e9e5a5e374782d9154b09ca7b7d 2006.0/i586/mozilla-firefox-da-1.5.0.7-0.1.20060mdk.i586.rpm a20a2bee8f26440b13294ef6247f66ec 2006.0/i586/mozilla-firefox-de-1.5.0.7-0.1.20060mdk.i586.rpm c60d356eddf74e8799b239a925b35953 2006.0/i586/mozilla-firefox-devel-1.5.0.7-0.1.20060mdk.i586.rpm 5b4fbc76811530cfc20ef319daf2f577 2006.0/i586/mozilla-firefox-el-1.5.0.7-0.1.20060mdk.i586.rpm fdc7591dc15dce7e373f4e167fb2c769 2006.0/i586/mozilla-firefox-es-1.5.0.7-0.1.20060mdk.i586.rpm 00a17b297ea7b7ee31a3fca5d3109ffc 2006.0/i586/mozilla-firefox-es_AR-1.5.0.7-0.1.20060mdk.i586.rpm 2bee9151bc0e40bf1ff22a9224643dcb 2006.0/i586/mozilla-firefox-eu-1.5.0.7-0.1.20060mdk.i586.rpm 03285b22a86c82b8558467befb5fa04b 2006.0/i586/mozilla-firefox-fi-1.5.0.7-0.1.20060mdk.i586.rpm f9dbe9c8d7b907e6c1a80f0bce2d9323 2006.0/i586/mozilla-firefox-fr-1.5.0.7-0.1.20060mdk.i586.rpm 4e13ea6856a71514c569581e06515ae8 2006.0/i586/mozilla-firefox-fy-1.5.0.7-0.1.20060mdk.i586.rpm 81b56a020127b1e9c41facb963e670be 2006.0/i586/mozilla-firefox-ga-1.5.0.7-0.1.20060mdk.i586.rpm 3a14f0cee1271d5f4cfedc8967a2be45 2006.0/i586/mozilla-firefox-he-1.5.0.7-0.1.20060mdk.i586.rpm 9612ac69d69114d1da1dc1bfa6530d9b 2006.0/i586/mozilla-firefox-hu-1.5.0.7-0.1.20060mdk.i586.rpm 9a47da16333b9c1d839e19420ab5c3a5 2006.0/i586/mozilla-firefox-it-1.5.0.7-0.1.20060mdk.i586.rpm ea5b214a43077114d8adaf184ba6ce61 2006.0/i586/mozilla-firefox-ja-1.5.0.7-0.1.20060mdk.i586.rpm ebf899b39e850438dd4cfb1bbab9ba8d 2006.0/i586/mozilla-firefox-ko-1.5.0.7-0.1.20060mdk.i586.rpm 18522be12bdda788de662d07d5a07e08 2006.0/i586/mozilla-firefox-lt-1.5.0.7-0.1.20060mdk.i586.rpm 19a62453c05c0443aa2999a177d50dac 2006.0/i586/mozilla-firefox-mk-1.5.0.7-0.1.20060mdk.i586.rpm 352aa6197b0b79025f5a71a3135d95c9 2006.0/i586/mozilla-firefox-nb-1.5.0.7-0.1.20060mdk.i586.rpm 64b460d997ff70bf0ff50400c20a98e1 2006.0/i586/mozilla-firefox-nl-1.5.0.7-0.1.20060mdk.i586.rpm 1f67f28a68d57baa96523ef05ccd1bbe 2006.0/i586/mozilla-firefox-pa_IN-1.5.0.7-0.1.20060mdk.i586.rpm f5b2681e10e6eb68e4fb9041262b65c5 2006.0/i586/mozilla-firefox-pl-1.5.0.7-0.1.20060mdk.i586.rpm 8d47794342c430b50dc04f7d4c65cf9d 2006.0/i586/mozilla-firefox-pt-1.5.0.7-0.1.20060mdk.i586.rpm d975c5d5ec3c8fed8846f02105ba4795 2006.0/i586/mozilla-firefox-pt_BR-1.5.0.7-0.1.20060mdk.i586.rpm 563d01331a992ec6ded54d5118bc10ad 2006.0/i586/mozilla-firefox-ro-1.5.0.7-0.1.20060mdk.i586.rpm 4da569e782da6c5b98eab4862c335600 2006.0/i586/mozilla-firefox-ru-1.5.0.7-0.1.20060mdk.i586.rpm 4a77a4d9b22704184694a1a0580440f5 2006.0/i586/mozilla-firefox-sk-1.5.0.7-0.1.20060mdk.i586.rpm 0a153e8351a1ffdfadf067cdf9b2ee06 2006.0/i586/mozilla-firefox-sl-1.5.0.7-0.1.20060mdk.i586.rpm e7ed42daf0c68890a34422d8f5b7dcf6 2006.0/i586/mozilla-firefox-sv-1.5.0.7-0.1.20060mdk.i586.rpm 542ce6ba9713683b8a741ab921cd3e45 2006.0/i586/mozilla-firefox-tr-1.5.0.7-0.1.20060mdk.i586.rpm 55c8c83ad72d6289bf1d45ea517b74ba 2006.0/i586/mozilla-firefox-uk-1.5.0.7-0.1.20060mdk.i586.rpm 591beaf9e8abf8911f023fb147efe765 2006.0/i586/mozilla-firefox-zh_CN-1.5.0.7-0.1.20060mdk.i586.rpm 23b9d2502d7cb24aeea82f358a428ec2 2006.0/i586/mozilla-firefox-zh_TW-1.5.0.7-0.1.20060mdk.i586.rpm be8acdc18fe55ea8a9d0afc553bf21d3 2006.0/i586/yelp-2.10.0-6.2.20060mdk.i586.rpm 8dd982b67f6a2663b557730db744f74e 2006.0/SRPMS/devhelp-0.10-7.2.20060mdk.src.rpm bb825c0cbdca42497eb6d486ca2d2d98 2006.0/SRPMS/epiphany-1.8.5-4.2.20060mdk.src.rpm b3bbcb7f0e3dfa05ca9344f2710c3a94 2006.0/SRPMS/epiphany-extensions-1.8.2-3.2.20060mdk.src.rpm 7d238bc6883ebbd3e1a284ec06d972df 2006.0/SRPMS/galeon-2.0.1-1.2.20060mdk.src.rpm 77efc529087ba7362d54559385d5cc2d 2006.0/SRPMS/mozilla-firefox-1.5.0.7-0.1.20060mdk.src.rpm 1143a2a6ab3f937660bf4d11dfb68313 2006.0/SRPMS/mozilla-firefox-l10n-1.5.0.7-0.1.20060mdk.src.rpm 8b9dd1db87f3824c088f4e1b58eb8224 2006.0/SRPMS/yelp-2.10.0-6.2.20060mdk.src.rpm Mandriva Linux 2006.0/X86_64: 8f79a25451b9f41d48df89f996869cc7 2006.0/x86_64/devhelp-0.10-7.2.20060mdk.x86_64.rpm a9b851ddb7a77ee0f6d73c9a475658e0 2006.0/x86_64/epiphany-1.8.5-4.2.20060mdk.x86_64.rpm 606bb2a3ece209a7c260fd81d776c123 2006.0/x86_64/epiphany-devel-1.8.5-4.2.20060mdk.x86_64.rpm bb99bf7ed2e5608849cb9b0bcac49041 2006.0/x86_64/epiphany-extensions-1.8.2-3.2.20060mdk.x86_64.rpm 6caf5e05026177525d0d04225e5dcc4a 2006.0/x86_64/galeon-2.0.1-1.2.20060mdk.x86_64.rpm 2ef32f51f707beff08db88d61aab842d 2006.0/x86_64/lib64devhelp-1_0-0.10-7.2.20060mdk.x86_64.rpm 50b6716aa33e6065ce0ba0b107fb3a8c 2006.0/x86_64/lib64devhelp-1_0-devel-0.10-7.2.20060mdk.x86_64.rpm 0b3997e3f646af18f684fdce56194ae3 2006.0/x86_64/lib64nspr4-1.5.0.7-0.1.20060mdk.x86_64.rpm 75e63b4f3785b8c7fa4924d7f30be921 2006.0/x86_64/lib64nspr4-devel-1.5.0.7-0.1.20060mdk.x86_64.rpm cda6b659c2777c44fdde0ac3ab1fb11b 2006.0/x86_64/lib64nspr4-static-devel-1.5.0.7-0.1.20060mdk.x86_64.rpm 4f3e6424fa71a629be1b81415fe2b875 2006.0/x86_64/lib64nss3-1.5.0.7-0.1.20060mdk.x86_64.rpm 7bd353454999969148524636267b68c5 2006.0/x86_64/lib64nss3-devel-1.5.0.7-0.1.20060mdk.x86_64.rpm fe0707524f8f3b4e1dcfe80c8bec0190 2006.0/x86_64/libnspr4-1.5.0.7-0.1.20060mdk.i586.rpm 770e8d6c5643c78f486ae2c115f7c740 2006.0/x86_64/libnspr4-devel-1.5.0.7-0.1.20060mdk.i586.rpm fafbff86e6f1d44b7d1ad3e5f1f24860 2006.0/x86_64/libnss3-1.5.0.7-0.1.20060mdk.i586.rpm 41c8df68fb4c2d8d37440d1dea73f8c6 2006.0/x86_64/libnss3-devel-1.5.0.7-0.1.20060mdk.i586.rpm 561212c426f35a3e2393ad3acbf11bda 2006.0/x86_64/mozilla-firefox-1.5.0.7-0.1.20060mdk.x86_64.rpm a4a76ca919cec68bef5ec0521e4185b2 2006.0/x86_64/mozilla-firefox-ar-1.5.0.7-0.1.20060mdk.x86_64.rpm e23f698f02d78a8d8b2ac056e91f106a 2006.0/x86_64/mozilla-firefox-bg-1.5.0.7-0.1.20060mdk.x86_64.rpm 1e815c45fb57ee56bd4d4258a8cda5ad 2006.0/x86_64/mozilla-firefox-br-1.5.0.7-0.1.20060mdk.x86_64.rpm 1c348254b80cec87c2b804825cdd8a5d 2006.0/x86_64/mozilla-firefox-ca-1.5.0.7-0.1.20060mdk.x86_64.rpm 6eac0be09030f9ed629107600bcbf88f 2006.0/x86_64/mozilla-firefox-cs-1.5.0.7-0.1.20060mdk.x86_64.rpm a06b4569f5392501df97fb209315782f 2006.0/x86_64/mozilla-firefox-da-1.5.0.7-0.1.20060mdk.x86_64.rpm 98aac82b44a66047d884b95f251cd6c5 2006.0/x86_64/mozilla-firefox-de-1.5.0.7-0.1.20060mdk.x86_64.rpm 9479078391f288562b612afff9cb994e 2006.0/x86_64/mozilla-firefox-devel-1.5.0.7-0.1.20060mdk.x86_64.rpm 247dce39896e7230ffda5ca8bc58d736 2006.0/x86_64/mozilla-firefox-el-1.5.0.7-0.1.20060mdk.x86_64.rpm a86cb00b8b07cd45a1274ddc318de2bd 2006.0/x86_64/mozilla-firefox-es-1.5.0.7-0.1.20060mdk.x86_64.rpm 8ba8f4e4d9fcfef9f3cc4ac71b15c5df 2006.0/x86_64/mozilla-firefox-es_AR-1.5.0.7-0.1.20060mdk.x86_64.rpm 4c477d0ef8c843b9416185508c9181a1 2006.0/x86_64/mozilla-firefox-eu-1.5.0.7-0.1.20060mdk.x86_64.rpm 6e9c4c9c6ba8cfefd32e4d135943824d 2006.0/x86_64/mozilla-firefox-fi-1.5.0.7-0.1.20060mdk.x86_64.rpm b8046ef3da338188287fa9a8ebfb9515 2006.0/x86_64/mozilla-firefox-fr-1.5.0.7-0.1.20060mdk.x86_64.rpm 1609e86fa50ef7c5c3ef827bf47090e8 2006.0/x86_64/mozilla-firefox-fy-1.5.0.7-0.1.20060mdk.x86_64.rpm 5cdf122cafadd7f2125d42246402e29d 2006.0/x86_64/mozilla-firefox-ga-1.5.0.7-0.1.20060mdk.x86_64.rpm 75f82717c62d51d00ba25abcdf3e26a5 2006.0/x86_64/mozilla-firefox-he-1.5.0.7-0.1.20060mdk.x86_64.rpm 75b03be94bdea20dbbf361a3a295e4c9 2006.0/x86_64/mozilla-firefox-hu-1.5.0.7-0.1.20060mdk.x86_64.rpm 672f36e40f7c5463b5e771bcaeae31af 2006.0/x86_64/mozilla-firefox-it-1.5.0.7-0.1.20060mdk.x86_64.rpm 8cf3e2082d406f71c4c7d3f638792e1e 2006.0/x86_64/mozilla-firefox-ja-1.5.0.7-0.1.20060mdk.x86_64.rpm 4f0f77a0b9fd79a671857fd330933289 2006.0/x86_64/mozilla-firefox-ko-1.5.0.7-0.1.20060mdk.x86_64.rpm b5c00962987efb764ea77e76c9734c79 2006.0/x86_64/mozilla-firefox-lt-1.5.0.7-0.1.20060mdk.x86_64.rpm f788aefcdac5b098d8853a3ef4fe146c 2006.0/x86_64/mozilla-firefox-mk-1.5.0.7-0.1.20060mdk.x86_64.rpm 4afff3966656a65b55290d08d446d864 2006.0/x86_64/mozilla-firefox-nb-1.5.0.7-0.1.20060mdk.x86_64.rpm e63e4db3037a915ac24dca78e5ae8617 2006.0/x86_64/mozilla-firefox-nl-1.5.0.7-0.1.20060mdk.x86_64.rpm 7e443e15233a3db5b76ae7c299d1e7d9 2006.0/x86_64/mozilla-firefox-pa_IN-1.5.0.7-0.1.20060mdk.x86_64.rpm 75ca84a45213c2d33d66b68c649dd875 2006.0/x86_64/mozilla-firefox-pl-1.5.0.7-0.1.20060mdk.x86_64.rpm 7a8cd126f5f5c63d45efe79a1e78e94d 2006.0/x86_64/mozilla-firefox-pt-1.5.0.7-0.1.20060mdk.x86_64.rpm 342155314a7801a1637d807e8ae8754d 2006.0/x86_64/mozilla-firefox-pt_BR-1.5.0.7-0.1.20060mdk.x86_64.rpm 359e5cb75905f2c08b49ecb1eccdf335 2006.0/x86_64/mozilla-firefox-ro-1.5.0.7-0.1.20060mdk.x86_64.rpm fa480b18d46eaed805f8fe0c92f6a9fe 2006.0/x86_64/mozilla-firefox-ru-1.5.0.7-0.1.20060mdk.x86_64.rpm 3233bb351b6c89deb25a6722df088e9a 2006.0/x86_64/mozilla-firefox-sk-1.5.0.7-0.1.20060mdk.x86_64.rpm f1347555bb50e32c58ac3edba31f3d1a 2006.0/x86_64/mozilla-firefox-sl-1.5.0.7-0.1.20060mdk.x86_64.rpm c20fd1c8861e74829879a63075fdf2f4 2006.0/x86_64/mozilla-firefox-sv-1.5.0.7-0.1.20060mdk.x86_64.rpm 8c73daea2686e503d3367d112c4c691e 2006.0/x86_64/mozilla-firefox-tr-1.5.0.7-0.1.20060mdk.x86_64.rpm 59d920837831e1a165ce19447066b4e5 2006.0/x86_64/mozilla-firefox-uk-1.5.0.7-0.1.20060mdk.x86_64.rpm 869bea0fbfc6b2c65ab525d80aed03b9 2006.0/x86_64/mozilla-firefox-zh_CN-1.5.0.7-0.1.20060mdk.x86_64.rpm 1b867a3b0b7d8efd86377d0f0dcb67c3 2006.0/x86_64/mozilla-firefox-zh_TW-1.5.0.7-0.1.20060mdk.x86_64.rpm 12ab7912491456d673058667c8c0dc3a 2006.0/x86_64/yelp-2.10.0-6.2.20060mdk.x86_64.rpm 8dd982b67f6a2663b557730db744f74e 2006.0/SRPMS/devhelp-0.10-7.2.20060mdk.src.rpm bb825c0cbdca42497eb6d486ca2d2d98 2006.0/SRPMS/epiphany-1.8.5-4.2.20060mdk.src.rpm b3bbcb7f0e3dfa05ca9344f2710c3a94 2006.0/SRPMS/epiphany-extensions-1.8.2-3.2.20060mdk.src.rpm 7d238bc6883ebbd3e1a284ec06d972df 2006.0/SRPMS/galeon-2.0.1-1.2.20060mdk.src.rpm 77efc529087ba7362d54559385d5cc2d 2006.0/SRPMS/mozilla-firefox-1.5.0.7-0.1.20060mdk.src.rpm 1143a2a6ab3f937660bf4d11dfb68313 2006.0/SRPMS/mozilla-firefox-l10n-1.5.0.7-0.1.20060mdk.src.rpm 8b9dd1db87f3824c088f4e1b58eb8224 2006.0/SRPMS/yelp-2.10.0-6.2.20060mdk.src.rpm Corporate 3.0: c106557de1e045e5840a453d710b63e7 corporate/3.0/i586/libnspr4-1.5.0.7-0.1.C30mdk.i586.rpm b5a3de7c01f7a4187f85bc66db242c67 corporate/3.0/i586/libnspr4-devel-1.5.0.7-0.1.C30mdk.i586.rpm 8d1cfeaf1cb031bc1ec4519994801b6a corporate/3.0/i586/libnspr4-static-devel-1.5.0.7-0.1.C30mdk.i586.rpm d08546a25f6e78701feed1d67d53fabd corporate/3.0/i586/libnss3-1.5.0.7-0.1.C30mdk.i586.rpm 3371ded40c0bd1a8e828d9e92aed09fd corporate/3.0/i586/libnss3-devel-1.5.0.7-0.1.C30mdk.i586.rpm 6d635b07ba60ed49fe27d4c633204520 corporate/3.0/i586/mozilla-firefox-1.5.0.7-0.1.C30mdk.i586.rpm aa83aaff11daa5889c9d36c928075341 corporate/3.0/i586/mozilla-firefox-ar-1.5.0.7-0.1.C30mdk.i586.rpm 059c5de9e7a5f658cfbc692c913b3403 corporate/3.0/i586/mozilla-firefox-bg-1.5.0.7-0.1.C30mdk.i586.rpm 63b8a1a7db1568964fe4dc1d32552f52 corporate/3.0/i586/mozilla-firefox-br-1.5.0.7-0.1.C30mdk.i586.rpm cf48e548709250792e5a87c12db71cf1 corporate/3.0/i586/mozilla-firefox-ca-1.5.0.7-0.1.C30mdk.i586.rpm 90c83713c4fd403c9999cf52c56eb282 corporate/3.0/i586/mozilla-firefox-cs-1.5.0.7-0.1.C30mdk.i586.rpm 91279bd7d327c1a3bc0855cb06007f82 corporate/3.0/i586/mozilla-firefox-da-1.5.0.7-0.1.C30mdk.i586.rpm 1fec2333c2988cc7cb7238d5bcf1812d corporate/3.0/i586/mozilla-firefox-de-1.5.0.7-0.1.C30mdk.i586.rpm debf0c0ddd775793cd87fedcaefc5cf7 corporate/3.0/i586/mozilla-firefox-devel-1.5.0.7-0.1.C30mdk.i586.rpm 6e9ec67c3a28bde55146ca1f475cb847 corporate/3.0/i586/mozilla-firefox-el-1.5.0.7-0.1.C30mdk.i586.rpm 53c7defd9f6f8168990e4f4d4fa3a495 corporate/3.0/i586/mozilla-firefox-es-1.5.0.7-0.1.C30mdk.i586.rpm 5ac67c7e12f4edd0429bc2f085e438e6 corporate/3.0/i586/mozilla-firefox-es_AR-1.5.0.7-0.1.C30mdk.i586.rpm 5d4ac2f2cd3d6aecd52365e54aa85d66 corporate/3.0/i586/mozilla-firefox-eu-1.5.0.7-0.1.C30mdk.i586.rpm aad00d0da3781f7165ed63df0276962d corporate/3.0/i586/mozilla-firefox-fi-1.5.0.7-0.1.C30mdk.i586.rpm c531c8f33674e476980aa2cf112440bc corporate/3.0/i586/mozilla-firefox-fr-1.5.0.7-0.1.C30mdk.i586.rpm 8f33047a9c560757a90831ea415ef814 corporate/3.0/i586/mozilla-firefox-fy-1.5.0.7-0.1.C30mdk.i586.rpm ec0a957af4cd462f58c3d846a37d68b4 corporate/3.0/i586/mozilla-firefox-ga-1.5.0.7-0.1.C30mdk.i586.rpm 1f8f0a6a7f962c1b1cf9d3dec38af0e2 corporate/3.0/i586/mozilla-firefox-he-1.5.0.7-0.1.C30mdk.i586.rpm 354c14637e7df983f16903f46bf81171 corporate/3.0/i586/mozilla-firefox-hu-1.5.0.7-0.1.C30mdk.i586.rpm b9fdd2f2db6f74ef240e23ace3a3a0c3 corporate/3.0/i586/mozilla-firefox-it-1.5.0.7-0.1.C30mdk.i586.rpm 831a3b7c411cc716527dfe1c97d63de2 corporate/3.0/i586/mozilla-firefox-ja-1.5.0.7-0.1.C30mdk.i586.rpm a89843c85143fa62e264f37df634b920 corporate/3.0/i586/mozilla-firefox-ko-1.5.0.7-0.1.C30mdk.i586.rpm 382ff5621db369b06e9d76a41a4fa509 corporate/3.0/i586/mozilla-firefox-lt-1.5.0.7-0.1.C30mdk.i586.rpm 4181358e7b0b84ff907bd5173be137d2 corporate/3.0/i586/mozilla-firefox-mk-1.5.0.7-0.1.C30mdk.i586.rpm 6da617d32c9eb917180eddd62aeabf54 corporate/3.0/i586/mozilla-firefox-nb-1.5.0.7-0.1.C30mdk.i586.rpm c0e559c0dc865c97435a918d77d690dd corporate/3.0/i586/mozilla-firefox-nl-1.5.0.7-0.1.C30mdk.i586.rpm 05a64d9e97c0ec16b661d93e4c49ba93 corporate/3.0/i586/mozilla-firefox-pa_IN-1.5.0.7-0.1.C30mdk.i586.rpm ef2379b44f8e241a7811eee7031e9838 corporate/3.0/i586/mozilla-firefox-pl-1.5.0.7-0.1.C30mdk.i586.rpm 08f36ddea8f0b8ad5decc76b6ebf7106 corporate/3.0/i586/mozilla-firefox-pt-1.5.0.7-0.1.C30mdk.i586.rpm 9af857fcd8a7e98707ae77fcbd17e25d corporate/3.0/i586/mozilla-firefox-pt_BR-1.5.0.7-0.1.C30mdk.i586.rpm 5b23c90450de3a6ee1b879dafb4e0ebb corporate/3.0/i586/mozilla-firefox-ro-1.5.0.7-0.1.C30mdk.i586.rpm 646d7d7ca0374da1d90c77ff827b7a3b corporate/3.0/i586/mozilla-firefox-ru-1.5.0.7-0.1.C30mdk.i586.rpm 25746d2ce3a97f620f1c098daef474ed corporate/3.0/i586/mozilla-firefox-sk-1.5.0.7-0.1.C30mdk.i586.rpm fb12bfb159f9d9a291e838cb6994daa5 corporate/3.0/i586/mozilla-firefox-sl-1.5.0.7-0.1.C30mdk.i586.rpm 962b2b084cde62a28341c177d006b755 corporate/3.0/i586/mozilla-firefox-sv-1.5.0.7-0.1.C30mdk.i586.rpm 784906446777df1d03ba5ac75e790104 corporate/3.0/i586/mozilla-firefox-tr-1.5.0.7-0.1.C30mdk.i586.rpm 543df7658745731ec6341a1d46901e5e corporate/3.0/i586/mozilla-firefox-uk-1.5.0.7-0.1.C30mdk.i586.rpm ef4728e96d4c1dadc4e9286022c6fc1a corporate/3.0/i586/mozilla-firefox-zh_CN-1.5.0.7-0.1.C30mdk.i586.rpm f974e234f39298065b5a120da2aad80f corporate/3.0/i586/mozilla-firefox-zh_TW-1.5.0.7-0.1.C30mdk.i586.rpm da8e3fd260eb19659ba6673583ad84d2 corporate/3.0/SRPMS/mozilla-firefox-1.5.0.7-0.1.C30mdk.src.rpm 016a9658232f45d63f5c21987dc59a31 corporate/3.0/SRPMS/mozilla-firefox-l10n-1.5.0.7-0.1.C30mdk.src.rpm Corporate 3.0/X86_64: 38e5d39281cf8fe28ae400ef6880ed82 corporate/3.0/x86_64/lib64nspr4-1.5.0.7-0.1.C30mdk.x86_64.rpm 8594d09e78d9ec76bed9bb5bf9065a9d corporate/3.0/x86_64/lib64nspr4-devel-1.5.0.7-0.1.C30mdk.x86_64.rpm 88ea20792afc414a8511312fc53c9973 corporate/3.0/x86_64/lib64nspr4-static-devel-1.5.0.7-0.1.C30mdk.x86_64.rpm 0749638fca3fc55a0c84b374c8ddce4c corporate/3.0/x86_64/lib64nss3-1.5.0.7-0.1.C30mdk.x86_64.rpm 3bd450c319eada8936baad026c0e7edc corporate/3.0/x86_64/lib64nss3-devel-1.5.0.7-0.1.C30mdk.x86_64.rpm 86a6c461d4b783867fbf62dba98b76a0 corporate/3.0/x86_64/mozilla-firefox-1.5.0.7-0.1.C30mdk.x86_64.rpm fa3bdb060dc9933093cd59604e0e9770 corporate/3.0/x86_64/mozilla-firefox-ar-1.5.0.7-0.1.C30mdk.x86_64.rpm cf50847d5e76e5a9b0cd9c48a156f919 corporate/3.0/x86_64/mozilla-firefox-bg-1.5.0.7-0.1.C30mdk.x86_64.rpm 5251818cebcf07fdb025aded5d99f092 corporate/3.0/x86_64/mozilla-firefox-br-1.5.0.7-0.1.C30mdk.x86_64.rpm 1ae9e70895e0bfb45034d2cfa4c937b8 corporate/3.0/x86_64/mozilla-firefox-ca-1.5.0.7-0.1.C30mdk.x86_64.rpm 3585c137dc33769069e8961fa5a7ae7b corporate/3.0/x86_64/mozilla-firefox-cs-1.5.0.7-0.1.C30mdk.x86_64.rpm e10f6d78aa54d325f8a38d7f8729f1ac corporate/3.0/x86_64/mozilla-firefox-da-1.5.0.7-0.1.C30mdk.x86_64.rpm 62bd1fd39df7abf0ce81eb9d711f6d14 corporate/3.0/x86_64/mozilla-firefox-de-1.5.0.7-0.1.C30mdk.x86_64.rpm e34c011d455b576e4e27b20d4bc057db corporate/3.0/x86_64/mozilla-firefox-devel-1.5.0.7-0.1.C30mdk.x86_64.rpm aebe66911dac80623339aee380ec165a corporate/3.0/x86_64/mozilla-firefox-el-1.5.0.7-0.1.C30mdk.x86_64.rpm 3c5f109ae088242966604dce6338f07b corporate/3.0/x86_64/mozilla-firefox-es-1.5.0.7-0.1.C30mdk.x86_64.rpm 17ef425bc7fc131b9de3632fb92317d1 corporate/3.0/x86_64/mozilla-firefox-es_AR-1.5.0.7-0.1.C30mdk.x86_64.rpm 15ea134fde2b507f46e6e4faf243135f corporate/3.0/x86_64/mozilla-firefox-eu-1.5.0.7-0.1.C30mdk.x86_64.rpm ce6f4aa7a0fb1ac425afc5d915bb392d corporate/3.0/x86_64/mozilla-firefox-fi-1.5.0.7-0.1.C30mdk.x86_64.rpm 13b0b693682e7def5e320473342cf4a0 corporate/3.0/x86_64/mozilla-firefox-fr-1.5.0.7-0.1.C30mdk.x86_64.rpm d5fd81f204e46d15b6d1124376ab0930 corporate/3.0/x86_64/mozilla-firefox-fy-1.5.0.7-0.1.C30mdk.x86_64.rpm cb389fc624d1961cf2ab00488bad7cef corporate/3.0/x86_64/mozilla-firefox-ga-1.5.0.7-0.1.C30mdk.x86_64.rpm 3cd572d77c055bf562c3678c513ff3c8 corporate/3.0/x86_64/mozilla-firefox-he-1.5.0.7-0.1.C30mdk.x86_64.rpm ea7215256650d751ae2ce0d20812fa96 corporate/3.0/x86_64/mozilla-firefox-hu-1.5.0.7-0.1.C30mdk.x86_64.rpm 57fcf8c6e9f251d3eb4f0096ca55cea3 corporate/3.0/x86_64/mozilla-firefox-it-1.5.0.7-0.1.C30mdk.x86_64.rpm d7f6310911b7e049876f7b70c16b8ccc corporate/3.0/x86_64/mozilla-firefox-ja-1.5.0.7-0.1.C30mdk.x86_64.rpm 8c0b97b440922510631400b5aea900ac corporate/3.0/x86_64/mozilla-firefox-ko-1.5.0.7-0.1.C30mdk.x86_64.rpm 8045c85ca598518aff6c7ead8f3fbf61 corporate/3.0/x86_64/mozilla-firefox-lt-1.5.0.7-0.1.C30mdk.x86_64.rpm 996d7bb252cf32b3ddce18a90b4bb8d9 corporate/3.0/x86_64/mozilla-firefox-mk-1.5.0.7-0.1.C30mdk.x86_64.rpm 5a3b346110144f79e05c20d13ac90663 corporate/3.0/x86_64/mozilla-firefox-nb-1.5.0.7-0.1.C30mdk.x86_64.rpm c56729c0896b11a9e49875fe2b493872 corporate/3.0/x86_64/mozilla-firefox-nl-1.5.0.7-0.1.C30mdk.x86_64.rpm da6306fcba9fba87d98f68208e752bf8 corporate/3.0/x86_64/mozilla-firefox-pa_IN-1.5.0.7-0.1.C30mdk.x86_64.rpm e94eca882ce53af3086bac6cf70076ea corporate/3.0/x86_64/mozilla-firefox-pl-1.5.0.7-0.1.C30mdk.x86_64.rpm 810bc3ca66d52d5537ece20a12679fec corporate/3.0/x86_64/mozilla-firefox-pt-1.5.0.7-0.1.C30mdk.x86_64.rpm c97bcde75d8118bb3d6c38428b811cc9 corporate/3.0/x86_64/mozilla-firefox-pt_BR-1.5.0.7-0.1.C30mdk.x86_64.rpm 629ec7999ae3fd23e36e2c6722847bbe corporate/3.0/x86_64/mozilla-firefox-ro-1.5.0.7-0.1.C30mdk.x86_64.rpm ad435041d1138f8a38a0a0739cff18d8 corporate/3.0/x86_64/mozilla-firefox-ru-1.5.0.7-0.1.C30mdk.x86_64.rpm f76501363a31bcd388f5edcc80881196 corporate/3.0/x86_64/mozilla-firefox-sk-1.5.0.7-0.1.C30mdk.x86_64.rpm e400f4b7e77307c8c5ab1bc26691168a corporate/3.0/x86_64/mozilla-firefox-sl-1.5.0.7-0.1.C30mdk.x86_64.rpm 126f45e769e463182b4ade57183684c1 corporate/3.0/x86_64/mozilla-firefox-sv-1.5.0.7-0.1.C30mdk.x86_64.rpm 160b09d1c10d0b781d8c1a17779432ed corporate/3.0/x86_64/mozilla-firefox-tr-1.5.0.7-0.1.C30mdk.x86_64.rpm c5c363d0552c8365bf5dc6a0936d28b2 corporate/3.0/x86_64/mozilla-firefox-uk-1.5.0.7-0.1.C30mdk.x86_64.rpm c4baf08469f1dbea8924429a7ec7b86e corporate/3.0/x86_64/mozilla-firefox-zh_CN-1.5.0.7-0.1.C30mdk.x86_64.rpm b9ce84c78e92b6f5e75954ada2706722 corporate/3.0/x86_64/mozilla-firefox-zh_TW-1.5.0.7-0.1.C30mdk.x86_64.rpm da8e3fd260eb19659ba6673583ad84d2 corporate/3.0/SRPMS/mozilla-firefox-1.5.0.7-0.1.C30mdk.src.rpm 016a9658232f45d63f5c21987dc59a31 corporate/3.0/SRPMS/mozilla-firefox-l10n-1.5.0.7-0.1.C30mdk.src.rpm Corporate 4.0: 64a0356cc8f1b1ffcdfdef3d8d146cc5 corporate/4.0/i586/libnspr4-1.5.0.7-0.1.20060mlcs4.i586.rpm 3f0b705031d1e95280e8194338b2d381 corporate/4.0/i586/libnspr4-devel-1.5.0.7-0.1.20060mlcs4.i586.rpm 1bba2e76f21b670f44ba65f8c92b67e1 corporate/4.0/i586/libnspr4-static-devel-1.5.0.7-0.1.20060mlcs4.i586.rpm cb10e515e0fad365a81273a9b620cbc7 corporate/4.0/i586/libnss3-1.5.0.7-0.1.20060mlcs4.i586.rpm 3534b6f0e0b64686aee7b0758ec33daf corporate/4.0/i586/libnss3-devel-1.5.0.7-0.1.20060mlcs4.i586.rpm c3aa90658d2adeb4e6543426c493a0fe corporate/4.0/i586/mozilla-firefox-1.5.0.7-0.1.20060mlcs4.i586.rpm 122e2ce3928dd2898118533f45f851e1 corporate/4.0/i586/mozilla-firefox-ar-1.5.0.7-0.1.20060mlcs4.i586.rpm 3ade855a9fc71980eec72c8dbc107ae3 corporate/4.0/i586/mozilla-firefox-bg-1.5.0.7-0.1.20060mlcs4.i586.rpm c189b7b4b54f4bdf040635750df007f8 corporate/4.0/i586/mozilla-firefox-br-1.5.0.7-0.1.20060mlcs4.i586.rpm 360d587d53e2a9c47dfff8a9137f1b4c corporate/4.0/i586/mozilla-firefox-ca-1.5.0.7-0.1.20060mlcs4.i586.rpm c2fa5da5d44a5f70bb49d5b4ba7e86e6 corporate/4.0/i586/mozilla-firefox-cs-1.5.0.7-0.1.20060mlcs4.i586.rpm 5df7bf2ff4059259ed0b5ea9f3587cc3 corporate/4.0/i586/mozilla-firefox-da-1.5.0.7-0.1.20060mlcs4.i586.rpm 278a321f6ee5928135585f03a05ae642 corporate/4.0/i586/mozilla-firefox-de-1.5.0.7-0.1.20060mlcs4.i586.rpm cd37b5dfe36b72fb482be5abc4bbbba7 corporate/4.0/i586/mozilla-firefox-devel-1.5.0.7-0.1.20060mlcs4.i586.rpm 9b49e02711849a4babedfa63c6aadefb corporate/4.0/i586/mozilla-firefox-el-1.5.0.7-0.1.20060mlcs4.i586.rpm d8293192b06e5a91df8314ecba17880e corporate/4.0/i586/mozilla-firefox-es-1.5.0.7-0.1.20060mlcs4.i586.rpm 5839e97fa06cca289121be5f33e9286d corporate/4.0/i586/mozilla-firefox-es_AR-1.5.0.7-0.1.20060mlcs4.i586.rpm 34d184e85b53c369a713c08f66e601dc corporate/4.0/i586/mozilla-firefox-eu-1.5.0.7-0.1.20060mlcs4.i586.rpm ab7b43c629095beee26dbb1381fbff9d corporate/4.0/i586/mozilla-firefox-fi-1.5.0.7-0.1.20060mlcs4.i586.rpm 79cfc37305b6a3977d7c7333c7e883de corporate/4.0/i586/mozilla-firefox-fr-1.5.0.7-0.1.20060mlcs4.i586.rpm 7e8f28d446d6e574d8a1521059c03144 corporate/4.0/i586/mozilla-firefox-fy-1.5.0.7-0.1.20060mlcs4.i586.rpm 0d2dd482cc76fb0df96c0bc5f4fa5844 corporate/4.0/i586/mozilla-firefox-ga-1.5.0.7-0.1.20060mlcs4.i586.rpm 58959b3a1d43cc2a666361804daa88f1 corporate/4.0/i586/mozilla-firefox-he-1.5.0.7-0.1.20060mlcs4.i586.rpm ded59cf4be8835dc0ada86add049ed86 corporate/4.0/i586/mozilla-firefox-hu-1.5.0.7-0.1.20060mlcs4.i586.rpm 8afd66b33e600714238e360a127df36e corporate/4.0/i586/mozilla-firefox-it-1.5.0.7-0.1.20060mlcs4.i586.rpm ef6a89b44e3b120f1bae29217728f196 corporate/4.0/i586/mozilla-firefox-ja-1.5.0.7-0.1.20060mlcs4.i586.rpm 1532d01d8123e87ee1103292ed95f68d corporate/4.0/i586/mozilla-firefox-ko-1.5.0.7-0.1.20060mlcs4.i586.rpm 8c0667ab59c15a9b66097f5e86df7220 corporate/4.0/i586/mozilla-firefox-lt-1.5.0.7-0.1.20060mlcs4.i586.rpm bcec75d2b059d123d6c21dae29baee00 corporate/4.0/i586/mozilla-firefox-mk-1.5.0.7-0.1.20060mlcs4.i586.rpm f5afdfd15e40f4ec6323a8cac098cb78 corporate/4.0/i586/mozilla-firefox-nb-1.5.0.7-0.1.20060mlcs4.i586.rpm 1544a7236d6a10521f89234feaff9435 corporate/4.0/i586/mozilla-firefox-nl-1.5.0.7-0.1.20060mlcs4.i586.rpm 53834f537b0eacd3bb59a2ccc6a40ea6 corporate/4.0/i586/mozilla-firefox-pa_IN-1.5.0.7-0.1.20060mlcs4.i586.rpm 70171f6ba3c24b51ec29be154e129bce corporate/4.0/i586/mozilla-firefox-pl-1.5.0.7-0.1.20060mlcs4.i586.rpm 4e64eee4ed44068cb9db5c77730c71b8 corporate/4.0/i586/mozilla-firefox-pt-1.5.0.7-0.1.20060mlcs4.i586.rpm d990c04de7c285225c51067ff92d8a58 corporate/4.0/i586/mozilla-firefox-pt_BR-1.5.0.7-0.1.20060mlcs4.i586.rpm 04ee85bd5b28b12466bcd8189d4ae480 corporate/4.0/i586/mozilla-firefox-ro-1.5.0.7-0.1.20060mlcs4.i586.rpm 222528603f2d88e4e46178620328ac7e corporate/4.0/i586/mozilla-firefox-ru-1.5.0.7-0.1.20060mlcs4.i586.rpm caacac0ace4c80fbf0d917ea95070114 corporate/4.0/i586/mozilla-firefox-sk-1.5.0.7-0.1.20060mlcs4.i586.rpm e4aabb47eacf2bcbb517e6890935d4e9 corporate/4.0/i586/mozilla-firefox-sl-1.5.0.7-0.1.20060mlcs4.i586.rpm e55300aa65e586aba56e5b75c3d0f0d7 corporate/4.0/i586/mozilla-firefox-sv-1.5.0.7-0.1.20060mlcs4.i586.rpm 8d857f4d255e86e4b1db933ab75a88b5 corporate/4.0/i586/mozilla-firefox-tr-1.5.0.7-0.1.20060mlcs4.i586.rpm 0d4998a9483e67ad0a484d8535950401 corporate/4.0/i586/mozilla-firefox-uk-1.5.0.7-0.1.20060mlcs4.i586.rpm 0677248472dd1f219ac4c633b3ae8427 corporate/4.0/i586/mozilla-firefox-zh_CN-1.5.0.7-0.1.20060mlcs4.i586.rpm 025ee723e8a157de742313163d8199e6 corporate/4.0/i586/mozilla-firefox-zh_TW-1.5.0.7-0.1.20060mlcs4.i586.rpm 137c81b452d542b3d4e1134cb1b3c8a1 corporate/4.0/SRPMS/mozilla-firefox-1.5.0.7-0.1.20060mlcs4.src.rpm d007a6b49b301a9215641888714c6f5f corporate/4.0/SRPMS/mozilla-firefox-l10n-1.5.0.7-0.1.20060mlcs4.src.rpm Corporate 4.0/X86_64: e9362e7e9d164dcf20ac2dd178057783 corporate/4.0/x86_64/lib64nspr4-1.5.0.7-0.1.20060mlcs4.x86_64.rpm 27152d5c4d45cfe65038b90014f4b128 corporate/4.0/x86_64/lib64nspr4-devel-1.5.0.7-0.1.20060mlcs4.x86_64.rpm a520a8169e6f7fa9636c7434820263cc corporate/4.0/x86_64/lib64nspr4-static-devel-1.5.0.7-0.1.20060mlcs4.x86_64.rpm 73fa1146e61ddf2baea07f4e51b247a2 corporate/4.0/x86_64/lib64nss3-1.5.0.7-0.1.20060mlcs4.x86_64.rpm 77c656121a9efaefb5bf8bea7416a190 corporate/4.0/x86_64/lib64nss3-devel-1.5.0.7-0.1.20060mlcs4.x86_64.rpm 1353fe3c1c7740891cca051691f2a844 corporate/4.0/x86_64/mozilla-firefox-1.5.0.7-0.1.20060mlcs4.x86_64.rpm 6e547a34386d9220269f6971df84459b corporate/4.0/x86_64/mozilla-firefox-ar-1.5.0.7-0.1.20060mlcs4.x86_64.rpm 37bd5e53ce8bd1196991a1d48c7d3fc2 corporate/4.0/x86_64/mozilla-firefox-bg-1.5.0.7-0.1.20060mlcs4.x86_64.rpm d8efb7b371fa3bc9d7dbda4d82bcea69 corporate/4.0/x86_64/mozilla-firefox-br-1.5.0.7-0.1.20060mlcs4.x86_64.rpm a4eb36d0ed16b308bf8146758468f720 corporate/4.0/x86_64/mozilla-firefox-ca-1.5.0.7-0.1.20060mlcs4.x86_64.rpm 1f3f6299c228a51c39dd9036d501baf3 corporate/4.0/x86_64/mozilla-firefox-cs-1.5.0.7-0.1.20060mlcs4.x86_64.rpm b7ed3aee73652f317d41612746b7f79e corporate/4.0/x86_64/mozilla-firefox-da-1.5.0.7-0.1.20060mlcs4.x86_64.rpm aa5e7732031b216f6cc4552b7e5bfe22 corporate/4.0/x86_64/mozilla-firefox-de-1.5.0.7-0.1.20060mlcs4.x86_64.rpm b99863ae0bc816222fec7afd596b4b38 corporate/4.0/x86_64/mozilla-firefox-devel-1.5.0.7-0.1.20060mlcs4.x86_64.rpm 22b5ef994c3f38b7b5a63808f0ef9c47 corporate/4.0/x86_64/mozilla-firefox-el-1.5.0.7-0.1.20060mlcs4.x86_64.rpm a5033ebf881cab82e063df8ffe29e22b corporate/4.0/x86_64/mozilla-firefox-es-1.5.0.7-0.1.20060mlcs4.x86_64.rpm 387dfb400ed59319e932a19e2dd4fe09 corporate/4.0/x86_64/mozilla-firefox-es_AR-1.5.0.7-0.1.20060mlcs4.x86_64.rpm 2a114b7e832d12fad87f2ad76ed89a7d corporate/4.0/x86_64/mozilla-firefox-eu-1.5.0.7-0.1.20060mlcs4.x86_64.rpm eced7a780c5f758eef5a0f71f43ed261 corporate/4.0/x86_64/mozilla-firefox-fi-1.5.0.7-0.1.20060mlcs4.x86_64.rpm 854bc6729675ed8670330f3da1e520b2 corporate/4.0/x86_64/mozilla-firefox-fr-1.5.0.7-0.1.20060mlcs4.x86_64.rpm b73ac49803411c5afb96d87cde8a89c9 corporate/4.0/x86_64/mozilla-firefox-fy-1.5.0.7-0.1.20060mlcs4.x86_64.rpm ca9a93da5b7f4dfc1eca188267891a66 corporate/4.0/x86_64/mozilla-firefox-ga-1.5.0.7-0.1.20060mlcs4.x86_64.rpm 267f8dc1ca9e04115050a311eebd00f1 corporate/4.0/x86_64/mozilla-firefox-he-1.5.0.7-0.1.20060mlcs4.x86_64.rpm 516850fa1de5417fdb96ab50fee1504f corporate/4.0/x86_64/mozilla-firefox-hu-1.5.0.7-0.1.20060mlcs4.x86_64.rpm ec13f241ff41c46590e31fd8339ffae7 corporate/4.0/x86_64/mozilla-firefox-it-1.5.0.7-0.1.20060mlcs4.x86_64.rpm 00eddff4c17ce23c148cbb2bfd27bc59 corporate/4.0/x86_64/mozilla-firefox-ja-1.5.0.7-0.1.20060mlcs4.x86_64.rpm 896cc9b5af7e66ddbf67ad819083a9aa corporate/4.0/x86_64/mozilla-firefox-ko-1.5.0.7-0.1.20060mlcs4.x86_64.rpm 52a752441fc870f33e792860ec328ecd corporate/4.0/x86_64/mozilla-firefox-lt-1.5.0.7-0.1.20060mlcs4.x86_64.rpm b418b4371503ed9502ca7eab01c6d86e corporate/4.0/x86_64/mozilla-firefox-mk-1.5.0.7-0.1.20060mlcs4.x86_64.rpm 801a63774bfd94ac7e292b97bc1c88a6 corporate/4.0/x86_64/mozilla-firefox-nb-1.5.0.7-0.1.20060mlcs4.x86_64.rpm 4998a34e227bcd0de4c64a08198cda13 corporate/4.0/x86_64/mozilla-firefox-nl-1.5.0.7-0.1.20060mlcs4.x86_64.rpm 0f809660f4c1e45133fc01003acee854 corporate/4.0/x86_64/mozilla-firefox-pa_IN-1.5.0.7-0.1.20060mlcs4.x86_64.rpm da3f053868769c3d1705158b925a3312 corporate/4.0/x86_64/mozilla-firefox-pl-1.5.0.7-0.1.20060mlcs4.x86_64.rpm b53c13931bdcebb9dec07ccb7512cc0d corporate/4.0/x86_64/mozilla-firefox-pt-1.5.0.7-0.1.20060mlcs4.x86_64.rpm 431f220901edaf32f504ee6dfd7d8262 corporate/4.0/x86_64/mozilla-firefox-pt_BR-1.5.0.7-0.1.20060mlcs4.x86_64.rpm 45d21d5351be8762640ae3038458c6b8 corporate/4.0/x86_64/mozilla-firefox-ro-1.5.0.7-0.1.20060mlcs4.x86_64.rpm 3bb59b3ca297d90181276683db70ceb7 corporate/4.0/x86_64/mozilla-firefox-ru-1.5.0.7-0.1.20060mlcs4.x86_64.rpm cce30e727a3dba740a537ec0040248f2 corporate/4.0/x86_64/mozilla-firefox-sk-1.5.0.7-0.1.20060mlcs4.x86_64.rpm 7221b6655d4061eb29ed5150f87b3706 corporate/4.0/x86_64/mozilla-firefox-sl-1.5.0.7-0.1.20060mlcs4.x86_64.rpm dd7c39076b8bb01d1b4432ba9cb29f12 corporate/4.0/x86_64/mozilla-firefox-sv-1.5.0.7-0.1.20060mlcs4.x86_64.rpm cacf45d88765c0c26d7256e5f392c2df corporate/4.0/x86_64/mozilla-firefox-tr-1.5.0.7-0.1.20060mlcs4.x86_64.rpm 703558369cbe9e4920eab509134d3a7e corporate/4.0/x86_64/mozilla-firefox-uk-1.5.0.7-0.1.20060mlcs4.x86_64.rpm 817fd873fb5f997916d61b2cf078d2c3 corporate/4.0/x86_64/mozilla-firefox-zh_CN-1.5.0.7-0.1.20060mlcs4.x86_64.rpm fe95060a37a586f98f5c3683131a9ef2 corporate/4.0/x86_64/mozilla-firefox-zh_TW-1.5.0.7-0.1.20060mlcs4.x86_64.rpm 137c81b452d542b3d4e1134cb1b3c8a1 corporate/4.0/SRPMS/mozilla-firefox-1.5.0.7-0.1.20060mlcs4.src.rpm d007a6b49b301a9215641888714c6f5f corporate/4.0/SRPMS/mozilla-firefox-l10n-1.5.0.7-0.1.20060mlcs4.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. This is an OpenPGP/MIME signed message (RFC 2440 and 3156) --------------enig38FF09D81E6F0DF2DC736FD8 Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: quoted-printable - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200609-19 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: Mozilla Firefox: Multiple vulnerabilities Date: September 28, 2006 Bugs: #147652 ID: 200609-19 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis =3D=3D=3D=3D=3D=3D=3D=3D The Mozilla Foundation has reported numerous vulnerabilities in Mozilla Firefox, including one that may allow execution of arbitrary code. Background =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D Mozilla Firefox is a redesign of the Mozilla Navigator component. The goal is to produce a cross-platform, stand-alone browser application. Affected packages =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 www-client/mozilla-firefox < 1.5.0.7 >=3D 1.5.0.7= 2 www-client/mozilla-firefox-bin < 1.5.0.7 >=3D 1.5.0.7= ------------------------------------------------------------------- 2 affected packages on all of their supported architectures. ------------------------------------------------------------------- Description =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D A number of vulnerabilities were found and fixed in Mozilla Firefox. For details please consult the references below. Impact =3D=3D=3D=3D=3D=3D The most severe vulnerability involves enticing a user to visit a malicious website, crashing the browser and executing arbitrary code with the rights of the user running the application. Workaround =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D There is no known workaround at this time. Resolution =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D All Mozilla Firefox users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose=20 ">=3Dwww-client/mozilla-firefox-1.5.0.7" Users of the binary package should upgrade as well: # emerge --sync # emerge --ask --oneshot --verbose=20 ">=3Dwww-client/mozilla-firefox-bin-1.5.0.7" References =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D [ 1 ] CVE-2006-4253 http://cve.mitre.org/cgi-bin/cvename.cgi?name=3DCVE-2006-4253 [ 2 ] CVE-2006-4340 http://cve.mitre.org/cgi-bin/cvename.cgi?name=3DCVE-2006-4340 [ 3 ] CVE-2006-4565 http://cve.mitre.org/cgi-bin/cvename.cgi?name=3DCVE-2006-4565 [ 4 ] CVE-2006-4566 http://cve.mitre.org/cgi-bin/cvename.cgi?name=3DCVE-2006-4566 [ 5 ] CVE-2006-4567 http://cve.mitre.org/cgi-bin/cvename.cgi?name=3DCVE-2006-4567 [ 6 ] CVE-2006-4568 http://cve.mitre.org/cgi-bin/cvename.cgi?name=3DCVE-2006-4568 [ 7 ] CVE-2006-4569 http://cve.mitre.org/cgi-bin/cvename.cgi?name=3DCVE-2006-4569 [ 8 ] CVE-2006-4571 http://cve.mitre.org/cgi-bin/cvename.cgi?name=3DCVE-2006-4571 Availability =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-200609-19.xml Concerns? =3D=3D=3D=3D=3D=3D=3D=3D=3D Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at http://bugs.gentoo.org. License =3D=3D=3D=3D=3D=3D=3D Copyright 2006 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 National Cyber Alert System Technical Cyber Security Alert TA06-333A Apple Releases Security Update to Address Multiple Vulnerabilities Original release date: November 29, 2006 Last revised: -- Source: US-CERT Systems Affected * Apple Mac OS X version 10.3.x and 10.4.x * Apple Mac OS X Server version 10.3.x and 10.4.x * Apple Safari web browser These vulnerabilities affect both Intel-based and PowerPC-based Apple systems. Overview Apple has released Security Update 2006-007 to correct multiple vulnerabilities affecting Mac OS X, Mac OS X Server, Safari web browser. Vulnerabilities in OpenSSL, gzip, and other products are also addressed. I. Description Apple Security Update 2006-007 addresses a number of vulnerabilities affecting Mac OS X, OS X Server, Safari web browser, and other products. Further details are available in the related vulnerability notes. This security update also addresses previously known vulnerabilities in PHP, Perl, OpenSSL, and gzip, which are shipped with Mac OS X. Information is also available through the OpenSSL vulnerabilities page. Information about the vulnerabilities in gzip is available in a series of vulnerability notes. II. Impact The impacts of these vulnerabilities vary. For specific details, see the appropriate vulnerability notes. Potential consequences include remote execution of arbitrary code or commands, bypass of security restrictions, and denial of service. III. Solution Install updates Install Apple Security Update 2006-007. IV. References * Vulnerability Notes for Apple Security Update 2006-007 - <http://www.kb.cert.org/vuls/byid?searchview&query=apple-2006-007> * Vulnerability Notes for OpenSSL Security Advisory [28th September 2006] - <http://www.kb.cert.org/vuls/byid?searchview&query=openssl_secadv_20060928> * Vulnerability Note VU#845620 - <http://www.kb.cert.org/vuls/id/845620> * Vulnerability Note VU#933712 - <http://www.kb.cert.org/vuls/id/933712> * Vulnerability Note VU#381508 - <http://www.kb.cert.org/vuls/id/381508> * Vulnerability Note VU#554780 - <http://www.kb.cert.org/vuls/id/554780> * Vulnerability Note VU#596848 - <http://www.kb.cert.org/vuls/id/596848> * Vulnerability Note VU#773548 - <http://www.kb.cert.org/vuls/id/773548> * About the security content of Security Update 2006-007 - <http://docs.info.apple.com/article.html?artnum=304829> * Mac OS X: Updating your software - <http://docs.info.apple.com/article.html?artnum=106704> * Apple Downloads - <http://www.apple.com/support/downloads/> * OpenSSL: OpenSSL vulnerabilities - <http://www.openssl.org/news/vulnerabilities.html> * Securing Your Web Browser - <http://www.us-cert.gov/reading_room/securing_browser/#Safari> _________________________________________________________________ The most recent version of this document can be found at: <http://www.us-cert.gov/cas/techalerts/TA06-333A.html> _________________________________________________________________ Feedback can be directed to US-CERT Technical Staff. Please send email to <cert@cert.org> with "TA06-333A Feedback VU#191336" in the subject. _________________________________________________________________ Produced 2006 by US-CERT, a government organization. Terms of use: <http://www.us-cert.gov/legal.html> _________________________________________________________________ Revision History November 29, 2006: Initial release -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iQEVAwUBRW33NuxOF3G+ig+rAQJtiggApJKRh7x+z8vp0xb26sE16RUOD3epcrk6 lJZ4rXnqVqoFacAt0Ucb8T43/Uc4N85UMa695YbFspYZum3hcGZo+WnNPolGUeRz iN/4bfKgzekfpbHxf6T3YvQYp+PVMRfHPUcxfaZDYXhu2813N4SSQpM59KRL5BD7 xr+5VvB09biVKlzpEdgtk2EHcqc+sMF5+o3cCgDJCnJNL+NG4J6d/hsyNP15ekTf 8m0W4rJonUe2gR2Bp7F1Y47KgRr3BT1aH2gxUSim9qEJpPdP/CkmGoFp+BfrFP9q A580LOrqFK8HIly1fbPKb26p2theUUESnQqM9Ob8xolkCDLy6h7ssg== =f7N+ -----END PGP SIGNATURE-----

Trust: 4.86

sources: NVD: CVE-2006-4340 // CERT/CC: VU#386964 // CERT/CC: VU#773548 // CERT/CC: VU#845620 // JVNDB: JVNDB-2006-000557 // BID: 19849 // PACKETSTORM: 51021 // PACKETSTORM: 50178 // PACKETSTORM: 50749 // PACKETSTORM: 50366 // PACKETSTORM: 52156 // PACKETSTORM: 51167 // PACKETSTORM: 50269 // PACKETSTORM: 50537 // PACKETSTORM: 52708

AFFECTED PRODUCTS

vendor:debian gnu linuxmodel: - scope: - version: -

Trust: 2.4

vendor:freebsdmodel: - scope: - version: -

Trust: 2.4

vendor:red hatmodel: - scope: - version: -

Trust: 2.4

vendor:slackware linuxmodel: - scope: - version: -

Trust: 2.4

vendor:ubuntumodel: - scope: - version: -

Trust: 2.4

vendor:mozillamodel:firefoxscope:lteversion:1.5.0.6

Trust: 1.8

vendor:mozillamodel:network security servicesscope:lteversion:3.11.2

Trust: 1.8

vendor:mozillamodel:seamonkeyscope:lteversion:1.0.4

Trust: 1.8

vendor:mozillamodel:thunderbirdscope:lteversion:1.5.0.6

Trust: 1.8

vendor:f5model: - scope: - version: -

Trust: 1.6

vendor:openpkgmodel: - scope: - version: -

Trust: 1.6

vendor:opensslmodel: - scope: - version: -

Trust: 1.6

vendor:oraclemodel: - scope: - version: -

Trust: 1.6

vendor:suse linuxmodel: - scope: - version: -

Trust: 1.6

vendor:rpathmodel: - scope: - version: -

Trust: 1.6

vendor:apple computermodel: - scope: - version: -

Trust: 1.6

vendor:openwall gnu linuxmodel: - scope: - version: -

Trust: 1.6

vendor:sunmodel:jre 011scope:eqversion:1.2.2

Trust: 1.5

vendor:sunmodel:sdk 011scope:eqversion:1.2.2

Trust: 1.5

vendor:sunmodel:jre 010scope:eqversion:1.2.2

Trust: 1.5

vendor:sunmodel:sdk 010scope:eqversion:1.2.2

Trust: 1.2

vendor:sunmodel:jre 013scope:eqversion:1.2.2

Trust: 1.2

vendor:sunmodel:jre 014scope:eqversion:1.2.2

Trust: 1.2

vendor:sunmodel:jrescope:eqversion:1.2.2

Trust: 1.2

vendor:sunmodel:sdk 08scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:sdk 11scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:sdk 15scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:jrescope:eqversion:1.5

Trust: 0.9

vendor:sunmodel:jrescope:eqversion:1.1.8

Trust: 0.9

vendor:sunmodel:jre 06scope:eqversion:1.5

Trust: 0.9

vendor:sunmodel:jre 015scope:eqversion:1.2.2

Trust: 0.9

vendor:sunmodel:jre 01scope:eqversion:1.4.1

Trust: 0.9

vendor:sunmodel:jre 10scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:jre 14scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:sdk 03scope:eqversion:1.4.1

Trust: 0.9

vendor:sunmodel:jdk 09scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jdk 007scope:eqversion:1.1.6

Trust: 0.9

vendor:sunmodel:jre 1.4.2 12scope: - version: -

Trust: 0.9

vendor:sunmodel:sdk 06scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:jre 02scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:sdk .0 02scope:eqversion:1.3

Trust: 0.9

vendor:sunmodel:jre .0 04scope:eqversion:1.4

Trust: 0.9

vendor:sunmodel:jrescope:eqversion:1.4

Trust: 0.9

vendor:sunmodel:jre 07scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:jre 11scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:jre 03scope:eqversion:1.4.1

Trust: 0.9

vendor:sunmodel:sdk 02scope:eqversion:1.4.1

Trust: 0.9

vendor:sunmodel:jre 01scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jre 04scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jre .0 02scope:eqversion:1.3

Trust: 0.9

vendor:sunmodel:sdk 07scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:jdk b 005scope:eqversion:1.1.7

Trust: 0.9

vendor:sunmodel:sdk 10scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:jre 02scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:sdkscope:eqversion:1.2

Trust: 0.9

vendor:sunmodel:jre 01scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:jre .0 03scope:eqversion:1.4

Trust: 0.9

vendor:sunmodel:sdk .0 03scope:eqversion:1.4

Trust: 0.9

vendor:sunmodel:jre 02scope:eqversion:1.4.1

Trust: 0.9

vendor:sunmodel:sdk 09scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:sdk 14scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:jdk .0 05scope:eqversion:1.5

Trust: 0.9

vendor:sunmodel:jre 06scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:sdk 12scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:jrescope:eqversion:1.4.1

Trust: 0.9

vendor:sunmodel:jre 03scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:sdk 02scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:sdkscope:eqversion:1.4.1

Trust: 0.9

vendor:sunmodel:sdk 08scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:sdk .0 4scope:eqversion:1.4

Trust: 0.9

vendor:sunmodel:sdk .0 02scope:eqversion:1.4

Trust: 0.9

vendor:sunmodel:sdk 007scope:eqversion:1.2.2

Trust: 0.9

vendor:sunmodel:jrescope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jrescope:eqversion:1.2.1

Trust: 0.9

vendor:sunmodel:jre 06scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:sdk 01scope:eqversion:1.4.1

Trust: 0.9

vendor:sunmodel:jre .0 02scope:eqversion:1.4

Trust: 0.9

vendor:sunmodel:jre 13scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:sdkscope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:sdk 13scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:jdk 008scope:eqversion:1.1.8

Trust: 0.9

vendor:sunmodel:jdk 08scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jre 05scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jre 08scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:jrescope:eqversion:1.2

Trust: 0.9

vendor:sunmodel:sdk 04scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jre 12scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:sdk 05scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:sdk 03scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:jre 03scope:eqversion:1.4.2

Trust: 0.9

vendor:sunmodel:sdkscope:eqversion:1.4

Trust: 0.9

vendor:sunmodel:jre .0 05scope:eqversion:1.3

Trust: 0.9

vendor:sunmodel:jre 05scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:sdk 05scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:sdk 03scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:sdk 015scope:eqversion:1.2.2

Trust: 0.9

vendor:sunmodel:sdkscope:eqversion:1.2.1

Trust: 0.9

vendor:sunmodel:sdk 012scope:eqversion:1.2.2

Trust: 0.9

vendor:sunmodel:jre 09scope:eqversion:1.3.1

Trust: 0.9

vendor:sunmodel:sdk 014scope:eqversion:1.2.2

Trust: 0.9

vendor:sunmodel:jre 007scope:eqversion:1.2.2

Trust: 0.9

vendor:sunmodel:jdk 009scope:eqversion:1.1.8

Trust: 0.9

vendor:trustix secure linuxmodel: - scope: - version: -

Trust: 0.8

vendor:appgate network securitymodel: - scope: - version: -

Trust: 0.8

vendor:attachmatewrqmodel: - scope: - version: -

Trust: 0.8

vendor:avayamodel: - scope: - version: -

Trust: 0.8

vendor:blue coatmodel: - scope: - version: -

Trust: 0.8

vendor:ciscomodel: - scope: - version: -

Trust: 0.8

vendor:gentoo linuxmodel: - scope: - version: -

Trust: 0.8

vendor:gnutlsmodel: - scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel: - scope: - version: -

Trust: 0.8

vendor:iaik java groupmodel: - scope: - version: -

Trust: 0.8

vendor:ibmmodel: - scope: - version: -

Trust: 0.8

vendor:internet consortiummodel: - scope: - version: -

Trust: 0.8

vendor:intotomodel: - scope: - version: -

Trust: 0.8

vendor:junipermodel: - scope: - version: -

Trust: 0.8

vendor:mandrivamodel: - scope: - version: -

Trust: 0.8

vendor:mozillamodel: - scope: - version: -

Trust: 0.8

vendor:operamodel: - scope: - version: -

Trust: 0.8

vendor:rsa securitymodel: - scope: - version: -

Trust: 0.8

vendor:ssh security corpmodel: - scope: - version: -

Trust: 0.8

vendor:sun microsystemsmodel: - scope: - version: -

Trust: 0.8

vendor:sybasemodel: - scope: - version: -

Trust: 0.8

vendor:vmwaremodel: - scope: - version: -

Trust: 0.8

vendor:vandykemodel: - scope: - version: -

Trust: 0.8

vendor:cybertrustmodel:asianux serverscope:eqversion:2.0

Trust: 0.8

vendor:cybertrustmodel:asianux serverscope:eqversion:2.1

Trust: 0.8

vendor:sun microsystemsmodel:mozillascope:eqversion:1.7 (solaris 10 sparc for )

Trust: 0.8

vendor:sun microsystemsmodel:mozillascope:eqversion:1.7 (solaris 10 x86 for )

Trust: 0.8

vendor:sun microsystemsmodel:mozillascope:eqversion:1.7 (solaris 8 sparc for )

Trust: 0.8

vendor:sun microsystemsmodel:mozillascope:eqversion:1.7 (solaris 8 x86 for )

Trust: 0.8

vendor:sun microsystemsmodel:mozillascope:eqversion:1.7 (solaris 9 sparc for )

Trust: 0.8

vendor:sun microsystemsmodel:mozillascope:eqversion:1.7 (solaris 9 x86 for )

Trust: 0.8

vendor:sun microsystemsmodel:solarisscope:eqversion:10 (sparc)

Trust: 0.8

vendor:sun microsystemsmodel:solarisscope:eqversion:10 (x86)

Trust: 0.8

vendor:sun microsystemsmodel:solarisscope:eqversion:8 (sparc)

Trust: 0.8

vendor:sun microsystemsmodel:solarisscope:eqversion:8 (x86)

Trust: 0.8

vendor:sun microsystemsmodel:solarisscope:eqversion:9 (sparc)

Trust: 0.8

vendor:sun microsystemsmodel:solarisscope:eqversion:9 (x86)

Trust: 0.8

vendor:hewlett packardmodel:hp-uxscope:eqversion:11.11

Trust: 0.8

vendor:hewlett packardmodel:hp-uxscope:eqversion:11.23

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:2.1 (as)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:2.1 (es)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:2.1 (ws)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:3 (as)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:3 (es)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:3 (ws)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:4 (as)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:4 (es)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:4 (ws)

Trust: 0.8

vendor:red hatmodel:enterprise linux desktopscope:eqversion:3.0

Trust: 0.8

vendor:red hatmodel:enterprise linux desktopscope:eqversion:4.0

Trust: 0.8

vendor:red hatmodel:linux advanced workstationscope:eqversion:2.1

Trust: 0.8

vendor:sunmodel:jre 005scope:eqversion:1.2.2

Trust: 0.6

vendor:sunmodel:jre 04scope:eqversion:1.3.1

Trust: 0.6

vendor:sunmodel:jre .0 01scope:eqversion:1.4

Trust: 0.6

vendor:sunmodel:jdk 003scope:eqversion:1.2.1

Trust: 0.6

vendor:sunmodel:jre 12scope:eqversion:1.4.2

Trust: 0.6

vendor:sunmodel:jdkscope:eqversion:1.1.8

Trust: 0.6

vendor:sunmodel:jdk 06scope:eqversion:1.2.2

Trust: 0.6

vendor:sunmodel:jre 007scope:eqversion:1.1.8

Trust: 0.6

vendor:sunmodel:jdk .0 04scope:eqversion:1.5

Trust: 0.6

vendor:sunmodel:jdk 005scope:eqversion:1.1.8

Trust: 0.6

vendor:sunmodel:jrescope:eqversion:1.3

Trust: 0.6

vendor:sunmodel:sdk 13scope:eqversion:1.2.2

Trust: 0.6

vendor:sunmodel:sdk 005scope:eqversion:1.2.2

Trust: 0.6

vendor:sunmodel:jre .0 04scope:eqversion:1.3

Trust: 0.6

vendor:sunmodel:jdk 006scope:eqversion:1.2.2

Trust: 0.6

vendor:sunmodel:sdk 01scope:eqversion:1.3.1

Trust: 0.6

vendor:sunmodel:jdk 05scope:eqversion:1.2.2

Trust: 0.6

vendor:sunmodel:jdk 007scope:eqversion:1.1.8

Trust: 0.6

vendor:sunmodel:jdk .0 03scope:eqversion:1.5

Trust: 0.6

vendor:sunmodel:jre 12scope:eqversion:1.2.2

Trust: 0.6

vendor:sybasemodel:appeonscope:eqversion:3.1

Trust: 0.6

vendor:sunmodel:jdk 06scope:eqversion:1.5

Trust: 0.6

vendor:sunmodel:jre b 007scope:eqversion:1.1.7

Trust: 0.6

vendor:sunmodel:sdk 05scope:eqversion:1.3

Trust: 0.6

vendor:sunmodel:jdk 002scope:eqversion:1.1.8

Trust: 0.6

vendor:sunmodel:jre 008scope:eqversion:1.1.8

Trust: 0.6

vendor:sunmodel:jdk 004scope:eqversion:1.2.2

Trust: 0.6

vendor:sunmodel:sdk 12scope:eqversion:1.2.2

Trust: 0.6

vendor:sunmodel:jdk 009scope:eqversion:1.1.6

Trust: 0.6

vendor:sunmodel:jdk 004scope:eqversion:1.2.1

Trust: 0.6

vendor:sunmodel:sdk 013scope:eqversion:1.2.2

Trust: 0.6

vendor:sunmodel:jdk b 007scope:eqversion:1.1.7

Trust: 0.6

vendor:sunmodel:jre 012scope:eqversion:1.2.2

Trust: 0.6

vendor:sunmodel:jre 005scope:eqversion:1.1.8

Trust: 0.6

vendor:sunmodel:jre 009scope:eqversion:1.1.8

Trust: 0.6

vendor:mozillamodel:seamonkeyscope:eqversion:1.0.4

Trust: 0.6

vendor:mozillamodel:network security servicesscope:eqversion:3.11.2

Trust: 0.6

vendor:mozillamodel:thunderbirdscope:eqversion:1.5.0.6

Trust: 0.6

vendor:mozillamodel:firefoxscope:eqversion:1.5.0.6

Trust: 0.6

vendor:beamodel:systems weblogic expressscope:eqversion:7.0.0.1

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:4.3

Trust: 0.3

vendor:ciscomodel:security agentscope:neversion:5.1.79

Trust: 0.3

vendor:redhatmodel:enterprise linux es ia64scope:eqversion:2.1

Trust: 0.3

vendor:opensslmodel:project openssl gscope:eqversion:0.9.7

Trust: 0.3

vendor:securemodel:computing snapgear sg565scope:eqversion:0

Trust: 0.3

vendor:ciscomodel:ciscoworks common servicesscope:eqversion:2.2

Trust: 0.3

vendor:sshmodel:communications security ssh tectia serverscope:eqversion:4.4.5

Trust: 0.3

vendor:ciscomodel:ons 15454sdhscope:eqversion:4.0(1)

Trust: 0.3

vendor:attachmatemodel:reflection for secure itscope:eqversion:6.1

Trust: 0.3

vendor:s u s emodel:linux professionalscope:eqversion:9.0

Trust: 0.3

vendor:turbolinuxmodel:appliance server hosting editionscope:eqversion:1.0

Trust: 0.3

vendor:netbsdmodel:netbsdscope:eqversion:2.1

Trust: 0.3

vendor:ciscomodel:call managerscope:eqversion:5.1

Trust: 0.3

vendor:ciscomodel:ons optical transport platformscope:eqversion:154543.1.0

Trust: 0.3

vendor:opensslmodel:project openssl b-36.8scope:eqversion:0.9.6

Trust: 0.3

vendor:redhatmodel:enterprise linux extrasscope:eqversion:4

Trust: 0.3

vendor:sybasemodel:eii avaki sdfscope:eqversion:5.0

Trust: 0.3

vendor:sybasemodel:risk analytics platformscope:eqversion:2.9

Trust: 0.3

vendor:beamodel:systems weblogic express spscope:eqversion:7.03

Trust: 0.3

vendor:avayamodel:s8300 cmscope:eqversion:3.1

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.3.2

Trust: 0.3

vendor:sunmodel:java system web server sp2scope:eqversion:6.0

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:5.4

Trust: 0.3

vendor:sshmodel:communications security ssh tectia kscope:neversion:4.3.10

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:6.1

Trust: 0.3

vendor:susemodel:linux enterprise desktopscope:eqversion:10

Trust: 0.3

vendor:ciscomodel:onsscope:neversion:154548.0

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:9.1

Trust: 0.3

vendor:ipcopmodel:ipcopscope:eqversion:1.4.11

Trust: 0.3

vendor:vmwaremodel:workstation buildscope:neversion:6.0.380004

Trust: 0.3

vendor:sybasemodel:easerverscope:eqversion:5.5

Trust: 0.3

vendor:vandykemodel:securecrtscope:eqversion:5.2.2

Trust: 0.3

vendor:ibmmodel:hardware management console for iseriesscope:eqversion:3.3.7

Trust: 0.3

vendor:vmwaremodel:workstation buildscope:eqversion:5.5.334685

Trust: 0.3

vendor:sybasemodel:ffi global fix litescope:eqversion:0

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:5.2

Trust: 0.3

vendor:iscmodel:bind b1scope:eqversion:9.2.7

Trust: 0.3

vendor:ciscomodel:ons 15454sdhscope:eqversion:4.1(0)

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.1.6

Trust: 0.3

vendor:ciscomodel:ons 15454sdhscope:eqversion:4.1(1)

Trust: 0.3

vendor:opensslmodel:project openssl hscope:eqversion:0.9.7

Trust: 0.3

vendor:sybasemodel:unwired orchestratorscope:eqversion:5.1

Trust: 0.3

vendor:hpmodel:openvms secure web serverscope:eqversion:1.2

Trust: 0.3

vendor:sgimodel:propack sp6scope:eqversion:3.0

Trust: 0.3

vendor:opensslmodel:project openssl iscope:eqversion:0.9.7

Trust: 0.3

vendor:sunmodel:java web proxy server sp8scope:eqversion:3.6

Trust: 0.3

vendor:sybasemodel:workspacescope:eqversion:1.6

Trust: 0.3

vendor:openpkgmodel:2-stable-20061018scope: - version: -

Trust: 0.3

vendor:opensslmodel:project openssl bscope:eqversion:0.9.6

Trust: 0.3

vendor:sunmodel:jre bscope:eqversion:1.1.7

Trust: 0.3

vendor:sunmodel:jrescope:eqversion:1.3.1

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:5.3

Trust: 0.3

vendor:beamodel:systems weblogic server spscope:eqversion:8.12

Trust: 0.3

vendor:beamodel:systems weblogic server spscope:eqversion:7.0.0.11

Trust: 0.3

vendor:beamodel:systems weblogic express spscope:eqversion:7.04

Trust: 0.3

vendor:debianmodel:linux mipselscope:eqversion:3.1

Trust: 0.3

vendor:freebsdmodel:-release-p3scope:eqversion:4.11

Trust: 0.3

vendor:beamodel:systems weblogic server for win32 spscope:eqversion:8.12

Trust: 0.3

vendor:vmwaremodel:esx serverscope:eqversion:3.0.1

Trust: 0.3

vendor:beamodel:systems weblogic server for win32 spscope:eqversion:7.0.0.11

Trust: 0.3

vendor:operamodel:software opera web browser win32scope:eqversion:6.0

Trust: 0.3

vendor:s u s emodel:linux professional x86 64scope:eqversion:9.2

Trust: 0.3

vendor:redmodel:hat enterprise linux asscope:eqversion:3

Trust: 0.3

vendor:netbsdmodel:4,0 betascope: - version: -

Trust: 0.3

vendor:sunmodel:jre .0 01scope:eqversion:1.3

Trust: 0.3

vendor:freebsdmodel:-stablepre122300scope:eqversion:4.2

Trust: 0.3

vendor:iscmodel:bind a1scope:eqversion:9.4

Trust: 0.3

vendor:operamodel:software opera web browser 1win32scope:eqversion:7.0

Trust: 0.3

vendor:mandrakesoftmodel:corporate server x86 64scope:eqversion:4.0

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:5.10

Trust: 0.3

vendor:mandrivamodel:linux mandrakescope:eqversion:2006.0

Trust: 0.3

vendor:sunmodel:jdk 09scope:eqversion:1.1.8

Trust: 0.3

vendor:sybasemodel:unwired accelerator and enterprise portalscope:eqversion:7.0

Trust: 0.3

vendor:ciscomodel:mdsscope:eqversion:95000

Trust: 0.3

vendor:netscapemodel:netscapescope:eqversion:6.2.3

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:8.51

Trust: 0.3

vendor:sunmodel:jre 12scope:eqversion:1.1.8

Trust: 0.3

vendor:beamodel:systems weblogic express for win32 spscope:eqversion:8.13

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.8

Trust: 0.3

vendor:sunmodel:sdk 10scope:eqversion:1.2.2

Trust: 0.3

vendor:ciscomodel:ons optical transport platformscope:eqversion:154544.1(0)

Trust: 0.3

vendor:sybasemodel:risk analytics platformscope:eqversion:3.0

Trust: 0.3

vendor:sunmodel:java web proxy serverscope:eqversion:3.6

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:1.5.0.5

Trust: 0.3

vendor:openpkgmodel:openpkgscope:eqversion:2.1

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:4.3.3

Trust: 0.3

vendor:beamodel:systems weblogic express spscope:eqversion:7.0.0.12

Trust: 0.3

vendor:sunmodel:jdk 1.5.0.0 06scope: - version: -

Trust: 0.3

vendor:sunmodel:one application server standard editionscope:eqversion:7.0

Trust: 0.3

vendor:ingatemodel:siparatorscope:neversion:4.5.1

Trust: 0.3

vendor:sunmodel:java system web server sp9scope:eqversion:6.0

Trust: 0.3

vendor:s u s emodel:linux personal ossscope:eqversion:10.0

Trust: 0.3

vendor:sunmodel:sdk 04scope:eqversion:1.3.1

Trust: 0.3

vendor:sshmodel:communications security ssh tectia serverscope:eqversion:4.4.6

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:eqversion:1.5.0.7

Trust: 0.3

vendor:mandrakesoftmodel:corporate serverscope:eqversion:4.0

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.0.1

Trust: 0.3

vendor:sunmodel:java system web server sp4scope:eqversion:6.1

Trust: 0.3

vendor:redhatmodel:enterprise linux wsscope:eqversion:2.1

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:4.1.3

Trust: 0.3

vendor:ciscomodel:access registrarscope: - version: -

Trust: 0.3

vendor:oraclemodel:http serverscope:eqversion:9.0.1

Trust: 0.3

vendor:sybasemodel:solonde etlscope:eqversion:3.6

Trust: 0.3

vendor:s u s emodel:linux openexchange serverscope: - version: -

Trust: 0.3

vendor:sunmodel:jssescope:eqversion:1.0.2

Trust: 0.3

vendor:sunmodel:one web server sp4scope:eqversion:6.0

Trust: 0.3

vendor:s u s emodel:linux personalscope:eqversion:9.2

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:4.1.1

Trust: 0.3

vendor:beamodel:systems weblogic server spscope:eqversion:7.05

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:7.54

Trust: 0.3

vendor:beamodel:systems weblogic server for win32scope:eqversion:7.0.0.1

Trust: 0.3

vendor:sunmodel:one web server sp7scope:eqversion:6.0

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:7.51

Trust: 0.3

vendor:beamodel:systems weblogic express for win32 spscope:eqversion:7.03

Trust: 0.3

vendor:sunmodel:one web server sp2scope:eqversion:6.0

Trust: 0.3

vendor:beamodel:systems weblogic server for win32 spscope:eqversion:7.05

Trust: 0.3

vendor:iscmodel:bind -p2scope:neversion:9.2.6

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:5.04

Trust: 0.3

vendor:vmwaremodel:workstationscope:eqversion:5.5.4

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.3.1

Trust: 0.3

vendor:sshmodel:communications security ssh tectia serverscope:eqversion:4.1

Trust: 0.3

vendor:sunmodel:java system web server sp2scope:eqversion:6.1

Trust: 0.3

vendor:freebsdmodel:-release-p5scope:eqversion:5.1

Trust: 0.3

vendor:s u s emodel:linux personal x86 64scope:eqversion:9.0

Trust: 0.3

vendor:sybasemodel:eii avaki sdfscope:eqversion:4.0

Trust: 0.3

vendor:gentoomodel:www-client/operascope:eqversion:9.0.2

Trust: 0.3

vendor:ciscomodel:ons 15454sdhscope:eqversion:2.3(5)

Trust: 0.3

vendor:openofficemodel:openofficescope:eqversion:2.3

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:7.10

Trust: 0.3

vendor:avayamodel:converged communications serverscope:eqversion:2.0

Trust: 0.3

vendor:operamodel:software opera web browser win32scope:eqversion:5.12

Trust: 0.3

vendor:ciscomodel:secure acs for windows ntscope:eqversion:2.6.2

Trust: 0.3

vendor:ciscomodel:security agentscope:eqversion:4.5

Trust: 0.3

vendor:opensslmodel:project openssl dscope:eqversion:0.9.6

Trust: 0.3

vendor:beamodel:systems weblogic server spscope:eqversion:7.01

Trust: 0.3

vendor:sybasemodel:rtdsscope:eqversion:2.0.1

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:4.2.2

Trust: 0.3

vendor:ciscomodel:gss global site selectorscope:eqversion:44900

Trust: 0.3

vendor:freebsdmodel:-stablescope:eqversion:6.0

Trust: 0.3

vendor:sshmodel:communications security ssh tectia serverscope:eqversion:4.4.4

Trust: 0.3

vendor:opensslmodel:project openssl beta2scope:eqversion:0.9.7

Trust: 0.3

vendor:ciscomodel:call manager es56scope:eqversion:4.0

Trust: 0.3

vendor:sunmodel:sdk 07scope:eqversion:1.2.2

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:4.10

Trust: 0.3

vendor:beamodel:systems weblogic server spscope:eqversion:7.06

Trust: 0.3

vendor:beamodel:systems weblogic server for win32 spscope:eqversion:7.01

Trust: 0.3

vendor:beamodel:systems weblogic server for win32 spscope:eqversion:7.06

Trust: 0.3

vendor:beamodel:systems weblogic server for win32 spscope:eqversion:7.02

Trust: 0.3

vendor:turbolinuxmodel:personalscope: - version: -

Trust: 0.3

vendor:operamodel:software opera web browser win32scope:eqversion:5.02

Trust: 0.3

vendor:beamodel:systems weblogic express for win32 spscope:eqversion:7.04

Trust: 0.3

vendor:opensslmodel:project openssl escope:eqversion:0.9.7

Trust: 0.3

vendor:freebsdmodel:-release-p32scope:eqversion:4.5

Trust: 0.3

vendor:openofficemodel:openofficescope:eqversion:3.1.1

Trust: 0.3

vendor:sunmodel:jre 007scope:eqversion:1.1.6

Trust: 0.3

vendor:sybasemodel:sdkscope:eqversion:12.5.1

Trust: 0.3

vendor:opensslmodel:project openssl fscope:eqversion:0.9.6

Trust: 0.3

vendor:ciscomodel:security agentscope:eqversion:5.1

Trust: 0.3

vendor:opensslmodel:project opensslscope:eqversion:0.9.7

Trust: 0.3

vendor:sunmodel:jre 01ascope:eqversion:1.3.1

Trust: 0.3

vendor:ciscomodel:works common servicesscope:eqversion:2.2

Trust: 0.3

vendor:attachmatemodel:reflection ftp clientscope:eqversion:12.0

Trust: 0.3

vendor:ciscomodel:secure acs for windows ntscope:eqversion:2.1

Trust: 0.3

vendor:vmwaremodel:esx serverscope:eqversion:2.5.3

Trust: 0.3

vendor:ciscomodel:unified presence serverscope:eqversion:1.0

Trust: 0.3

vendor:sybasemodel:ffi global fixscope:eqversion:0

Trust: 0.3

vendor:sshmodel:communications security ssh tectiascope:neversion:5.1.1

Trust: 0.3

vendor:ubuntumodel:linux lts sparcscope:eqversion:6.06

Trust: 0.3

vendor:ciscomodel:call manager es33scope:eqversion:4.1

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:4.3.1

Trust: 0.3

vendor:sybasemodel:easerverscope:eqversion:6.0

Trust: 0.3

vendor:ciscomodel:ons 15454sdhscope:eqversion:3.1

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:10.2

Trust: 0.3

vendor:vmwaremodel:workstationscope:eqversion:5.5.5

Trust: 0.3

vendor:s u s emodel:linux professionalscope:eqversion:9.1

Trust: 0.3

vendor:ciscomodel:call managerscope:eqversion:4.0

Trust: 0.3

vendor:freebsdmodel:-prereleasescope:eqversion:5.4

Trust: 0.3

vendor:sunmodel:jre 07scope:eqversion:1.4.1

Trust: 0.3

vendor:openvpnmodel:beta11scope:eqversion:2.0

Trust: 0.3

vendor:sybasemodel:rtdsscope:eqversion:3.1

Trust: 0.3

vendor:sunmodel:jsse 01scope:eqversion:1.0.3

Trust: 0.3

vendor:oraclemodel:http serverscope:eqversion:1.0.2.1

Trust: 0.3

vendor:sunmodel:java system web server sp8scope:eqversion:6.0

Trust: 0.3

vendor:sunmodel:java system application server 2004q2scope:eqversion:7.0

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:4.3.2

Trust: 0.3

vendor:iscmodel:bind bscope:eqversion:9.3.3

Trust: 0.3

vendor:vmwaremodel:workstationscope:eqversion:6.0.1

Trust: 0.3

vendor:openvpnmodel:openvpnscope:eqversion:2.0.3

Trust: 0.3

vendor:vmwaremodel:workstation buildscope:eqversion:5.5.444386

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.1.3.132

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:4.3.1

Trust: 0.3

vendor:sunmodel:java web proxy server sp3scope:eqversion:3.6

Trust: 0.3

vendor:sunmodel:jre 009scope:eqversion:1.1.6

Trust: 0.3

vendor:sshmodel:communications security ssh tectiascope:eqversion:2.1.3

Trust: 0.3

vendor:ciscomodel:secure acs for windows ntscope:eqversion:2.5

Trust: 0.3

vendor:beamodel:systems weblogic server for win32scope:eqversion:8.1

Trust: 0.3

vendor:sshmodel:communications security ssh tectia serverscope:eqversion:4.4

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.2

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:8.52

Trust: 0.3

vendor:netbsdmodel:netbsdscope:eqversion:3.0.2

Trust: 0.3

vendor:sunmodel:jre b 005scope:eqversion:1.1.7

Trust: 0.3

vendor:ciscomodel:security agentscope:eqversion:4.5.1.639

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.1.5

Trust: 0.3

vendor:redmodel:hat enterprise linux asscope:eqversion:2.1

Trust: 0.3

vendor:redhatmodel:desktopscope:eqversion:4.0

Trust: 0.3

vendor:debianmodel:linux hppascope:eqversion:3.1

Trust: 0.3

vendor:vmwaremodel:workstation buildscope:eqversion:5.5.342958

Trust: 0.3

vendor:sunmodel:jsse 02scope:eqversion:1.0.3

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.0

Trust: 0.3

vendor:ciscomodel:application & content networking softwarescope: - version: -

Trust: 0.3

vendor:sshmodel:communications security ssh tectia serverscope:eqversion:4.4.2

Trust: 0.3

vendor:redhatmodel:enterprise linux esscope:eqversion:3

Trust: 0.3

vendor:sunmodel:jre 11scope:eqversion:1.2.2

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:4.8

Trust: 0.3

vendor:attachmatemodel:reflectionscope:eqversion:8.0

Trust: 0.3

vendor:ciscomodel:security agentscope:eqversion:4.0.3.728

Trust: 0.3

vendor:ciscomodel:call managerscope:eqversion:4.3(1)

Trust: 0.3

vendor:ciscomodel:ciscoworks common management foundationscope:eqversion:2.1

Trust: 0.3

vendor:openvpnmodel:openvpnscope:neversion:2.0.8

Trust: 0.3

vendor:novellmodel:international cryptographic infrastructurescope:neversion:2.7.2

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:4.7

Trust: 0.3

vendor:sybasemodel:risk analytics platformscope:eqversion:2.0

Trust: 0.3

vendor:sybasemodel:rtdsscope:eqversion:4.0

Trust: 0.3

vendor:ciscomodel:ons optical transport platformscope:eqversion:154544.1

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:8.54

Trust: 0.3

vendor:operamodel:software opera web browser betascope:eqversion:83

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:3.3.1

Trust: 0.3

vendor:s u s emodel:linux professional x86 64scope:eqversion:9.1

Trust: 0.3

vendor:beamodel:systems weblogic express for win32scope:eqversion:7.0.0.1

Trust: 0.3

vendor:securemodel:computing snapgear u2scope:neversion:3.1.4

Trust: 0.3

vendor:beamodel:systems weblogic express spscope:eqversion:7.07

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:7.53

Trust: 0.3

vendor:openofficemodel:openofficescope:eqversion:2.4

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:4.1.1

Trust: 0.3

vendor:beamodel:systems weblogic serverscope:eqversion:7.0

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:7.21

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:3.2

Trust: 0.3

vendor:sunmodel:java system web server sp5scope:eqversion:6.0

Trust: 0.3

vendor:securemodel:computing snapgear sg580scope:eqversion:0

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.1.4

Trust: 0.3

vendor:ciscomodel:ons 15454e optical transport platformscope:eqversion:0

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.1.1

Trust: 0.3

vendor:sybasemodel:data auditingscope:eqversion:4.5.3

Trust: 0.3

vendor:openofficemodel:openofficescope:neversion:3.2

Trust: 0.3

vendor:vmwaremodel:playerscope:eqversion:1.0.5

Trust: 0.3

vendor:sybasemodel:afariascope:eqversion:5.0

Trust: 0.3

vendor:beamodel:systems weblogic express for win32 spscope:eqversion:8.11

Trust: 0.3

vendor:freebsdmodel:-release-p42scope:eqversion:4.4

Trust: 0.3

vendor:ciscomodel:ons mstpscope:eqversion:154540

Trust: 0.3

vendor:arkoonmodel:ssl360scope:neversion:2.0/3

Trust: 0.3

vendor:sunmodel:java system application server 2004q2 r1standardscope:eqversion:7.0

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:1.0.5

Trust: 0.3

vendor:ibmmodel:hardware management console for pseriesscope:eqversion:3.3.7

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:4.4

Trust: 0.3

vendor:sshmodel:communications security ssh tectia server for ibm z/osscope:eqversion:5.1

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:4.11

Trust: 0.3

vendor:sybasemodel:easerverscope:eqversion:5.2

Trust: 0.3

vendor:openvpnmodel:openvpnscope:eqversion:2.0.5

Trust: 0.3

vendor:ciscomodel:secure acs solution enginescope: - version: -

Trust: 0.3

vendor:openofficemodel:openofficescope:eqversion:2.2

Trust: 0.3

vendor:ciscomodel:ons optical transport platformscope:eqversion:154544.6(0)

Trust: 0.3

vendor:opensslmodel:project openssl bscope:eqversion:0.9.8

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:8.0

Trust: 0.3

vendor:sybasemodel:unwired orchestratorscope:eqversion:4.3

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.1.2

Trust: 0.3

vendor:sybasemodel:data direct odbc/ole-db drivers for asescope:eqversion:0

Trust: 0.3

vendor:sunmodel:java system web server sp3scope:eqversion:6.0

Trust: 0.3

vendor:avayamodel:s8500 r2.0.1scope: - version: -

Trust: 0.3

vendor:ibmmodel:hardware management console for pseries r1.0scope:eqversion:5.0

Trust: 0.3

vendor:sshmodel:communications security tectiascope:eqversion:2.0

Trust: 0.3

vendor:iscmodel:bind a5scope:eqversion:9.4

Trust: 0.3

vendor:sybasemodel:global fix litescope:eqversion:0

Trust: 0.3

vendor:sybasemodel:easerverscope:eqversion:5.3

Trust: 0.3

vendor:operamodel:software opera web browser win32 betascope:eqversion:7.01

Trust: 0.3

vendor:sshmodel:communications security ssh tectia managerscope:eqversion:2.1.3

Trust: 0.3

vendor:s u s emodel:linux personalscope:eqversion:9.1

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:4.6.2

Trust: 0.3

vendor:ciscomodel:ons optical transport platformscope:eqversion:154544.1(1)

Trust: 0.3

vendor:ciscomodel:works common servicesscope:eqversion:3.0

Trust: 0.3

vendor:ciscomodel:ons optical transport platformscope:eqversion:154544.6(1)

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:4.8

Trust: 0.3

vendor:operamodel:software opera web browser linuxscope:eqversion:6.0.1

Trust: 0.3

vendor:iscmodel:bind -p1scope:eqversion:9.2.6

Trust: 0.3

vendor:netscapemodel:netscapescope:eqversion:7.1

Trust: 0.3

vendor:sshmodel:communications security ssh tectia serverscope:neversion:4.4.7

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:7.22

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:4.2.1

Trust: 0.3

vendor:ibmmodel:hardware management console for iseries r5.0scope:eqversion:4.0

Trust: 0.3

vendor:ciscomodel:wide area application servicesscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:secure acs solution enginescope:eqversion:3.3.1

Trust: 0.3

vendor:ciscomodel:security agentscope:eqversion:4.0

Trust: 0.3

vendor:openofficemodel:openofficescope:eqversion:2.0.4

Trust: 0.3

vendor:hpmodel:virtualvault a.04.50scope: - version: -

Trust: 0.3

vendor:sunmodel:jdk 14scope:eqversion:1.1.8

Trust: 0.3

vendor:avayamodel:integrated managementscope: - version: -

Trust: 0.3

vendor:sunmodel:secure global desktopscope:eqversion:4.2

Trust: 0.3

vendor:ciscomodel:ons optical transport platformscope:eqversion:154544.14

Trust: 0.3

vendor:opensslmodel:project openssl gscope:eqversion:0.9.6

Trust: 0.3

vendor:iscmodel:bind a4scope:eqversion:9.4

Trust: 0.3

vendor:securemodel:computing snapgear sg560scope:eqversion:0

Trust: 0.3

vendor:s u s emodel:suse linux school server for i386scope: - version: -

Trust: 0.3

vendor:sshmodel:communications security ssh tectia connectorscope:eqversion:5.0.1

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:4.5

Trust: 0.3

vendor:openpkgmodel:currentscope: - version: -

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:4.2

Trust: 0.3

vendor:sunmodel:jre 10scope:eqversion:1.1.8

Trust: 0.3

vendor:sybasemodel:rtdsscope:eqversion:2.0

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:4.3.4

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:4.3

Trust: 0.3

vendor:sunmodel:one web serverscope:eqversion:6.0

Trust: 0.3

vendor:iscmodel:bind rc2scope:eqversion:9.2.7

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.0

Trust: 0.3

vendor:beamodel:systems weblogic express for win32scope:eqversion:8.1

Trust: 0.3

vendor:sshmodel:communications security ssh tectia managerscope:neversion:2.2.1

Trust: 0.3

vendor:sybasemodel:rtdsscope:eqversion:3.5

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:5.1

Trust: 0.3

vendor:ciscomodel:secure acs for windows ntscope:eqversion:2.3

Trust: 0.3

vendor:beamodel:systems weblogic express for win32 spscope:eqversion:7.07

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:5.2.1

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:4.11

Trust: 0.3

vendor:ciscomodel:call manager es07scope:eqversion:4.1

Trust: 0.3

vendor:beamodel:systems weblogic server spscope:eqversion:7.04

Trust: 0.3

vendor:sshmodel:communications security ssh tectia serverscope:eqversion:4.4.1

Trust: 0.3

vendor:sunmodel:jdk 1.5.0.0 04scope: - version: -

Trust: 0.3

vendor:sunmodel:java system web server sp5scope:eqversion:6.1

Trust: 0.3

vendor:sybasemodel:workspacescope:eqversion:1.5

Trust: 0.3

vendor:s u s emodel:tomboyscope:eqversion:9.3

Trust: 0.3

vendor:ibmmodel:hardware management console for iseries r1.0scope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux ia-64scope:eqversion:3.1

Trust: 0.3

vendor:sunmodel:one application server platform editionscope:eqversion:7.0

Trust: 0.3

vendor:redhatmodel:enterprise linux wsscope:eqversion:4

Trust: 0.3

vendor:attachmatemodel:reflectionscope:eqversion:x0

Trust: 0.3

vendor:opensslmodel:project openssl hscope:eqversion:0.9.6

Trust: 0.3

vendor:freebsdmodel:-stablescope:eqversion:5.5

Trust: 0.3

vendor:sybasemodel:ecdascope:eqversion:12.6

Trust: 0.3

vendor:sshmodel:communications security ssh tectia managerscope:eqversion:2.2

Trust: 0.3

vendor:operamodel:software opera web browser jscope:eqversion:7.11

Trust: 0.3

vendor:opensslmodel:project openssl ascope:eqversion:0.9.5

Trust: 0.3

vendor:opensslmodel:project openssl iscope:eqversion:0.9.6

Trust: 0.3

vendor:ciscomodel:security agentscope:eqversion:4.5.1

Trust: 0.3

vendor:iscmodel:bind rc2scope:eqversion:9.3.3

Trust: 0.3

vendor:ciscomodel:secure acs for windows ntscope:eqversion:3.0.1

Trust: 0.3

vendor:ciscomodel:secure acs for windows ntscope:eqversion:3.1.1

Trust: 0.3

vendor:openvpnmodel:openvpnscope:eqversion:2.0.4

Trust: 0.3

vendor:mandrakesoftmodel:corporate server x86 64scope:eqversion:3.0

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.1.2

Trust: 0.3

vendor:ciscomodel:ons 15454sdhscope:eqversion:3.4

Trust: 0.3

vendor:sybasemodel:appeonscope:eqversion:5.0

Trust: 0.3

vendor:sunmodel:solaris 8 x86scope: - version: -

Trust: 0.3

vendor:redhatmodel:enterprise linux esscope:eqversion:2.1

Trust: 0.3

vendor:openofficemodel:openofficescope:eqversion:2.0.1

Trust: 0.3

vendor:sunmodel:one web server sp9scope:eqversion:6.0

Trust: 0.3

vendor:ciscomodel:secure acs solution enginescope:eqversion:3.3

Trust: 0.3

vendor:sshmodel:communications security ssh tectia connectorscope:neversion:5.0.3

Trust: 0.3

vendor:ciscomodel:secure acs for unixscope:eqversion:2.3

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:4.7

Trust: 0.3

vendor:netbsdmodel:netbsdscope:eqversion:2.0.4

Trust: 0.3

vendor:opensslmodel:project openssl cscope:eqversion:0.9.6

Trust: 0.3

vendor:beamodel:systems weblogic server spscope:eqversion:7.0.0.12

Trust: 0.3

vendor:ciscomodel:secure acs for windows ntscope:eqversion:2.42

Trust: 0.3

vendor:sshmodel:communications security ssh tectia serverscope:eqversion:4.2

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.1

Trust: 0.3

vendor:oraclemodel:http serverscope:eqversion:9.0.2

Trust: 0.3

vendor:beamodel:systems weblogic server for win32 spscope:eqversion:7.0.0.12

Trust: 0.3

vendor:oraclemodel:http serverscope:eqversion:9.1

Trust: 0.3

vendor:debianmodel:linux amd64scope:eqversion:3.1

Trust: 0.3

vendor:ciscomodel:call manager es50scope:eqversion:4.1

Trust: 0.3

vendor:opensslmodel:project opensslscope:eqversion:0.9.3

Trust: 0.3

vendor:oraclemodel:http serverscope:eqversion:8.1.7

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:8.50

Trust: 0.3

vendor:opensslmodel:project openssl cscope:eqversion:0.9.1

Trust: 0.3

vendor:sybasemodel:workspacescope:eqversion:1.0

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:5.04

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:4.5

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:5.0

Trust: 0.3

vendor:mandrakesoftmodel:corporate serverscope:eqversion:3.0

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:6.06

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:6.0.1

Trust: 0.3

vendor:openpkgmodel:openpkgscope:eqversion:2.4

Trust: 0.3

vendor:sybasemodel:ecdascope:eqversion:12.5

Trust: 0.3

vendor:sunmodel:jre 07scope:eqversion:1.2.2

Trust: 0.3

vendor:avayamodel:s8500 r2.0.0scope: - version: -

Trust: 0.3

vendor:avayamodel:s8700 r2.0.0scope: - version: -

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.2.1

Trust: 0.3

vendor:sunmodel:sdk 05ascope:eqversion:1.2.2

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.10

Trust: 0.3

vendor:beamodel:systems weblogic server for win32scope:eqversion:9.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.3.9

Trust: 0.3

vendor:operamodel:software opera web browser linuxscope:eqversion:6.0.3

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:5.1

Trust: 0.3

vendor:sunmodel:java web proxy server sp4scope:eqversion:3.6

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:4.3.3

Trust: 0.3

vendor:opensslmodel:project openssl ascope:eqversion:0.9.8

Trust: 0.3

vendor:redmodel:hat network satellite (for rhelscope:eqversion:3)4.2

Trust: 0.3

vendor:vmwaremodel:serverscope:eqversion:1.0.3

Trust: 0.3

vendor:sybasemodel:eii avaki sdfscope:eqversion:3.0

Trust: 0.3

vendor:ciscomodel:ons optical transport platformscope:eqversion:154544.1(2)

Trust: 0.3

vendor:openofficemodel:openofficescope:eqversion:3.1

Trust: 0.3

vendor:openpkgmodel:openpkgscope:eqversion:2.2

Trust: 0.3

vendor:operamodel:software opera web browser beta buildscope:eqversion:7.2012981

Trust: 0.3

vendor:opensslmodel:project openssl cscope:eqversion:0.9.7

Trust: 0.3

vendor:freebsdmodel:-release-p20scope:eqversion:4.11

Trust: 0.3

vendor:ciscomodel:security agentscope:eqversion:4.0.3

Trust: 0.3

vendor:oraclemodel:http serverscope:eqversion:9.2.8

Trust: 0.3

vendor:iscmodel:bind b1scope:eqversion:9.3.3

Trust: 0.3

vendor:trustixmodel:secure linuxscope:eqversion:2.2

Trust: 0.3

vendor:ciscomodel:security marsscope:eqversion:4.2.2

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9

Trust: 0.3

vendor:sybasemodel:eii avaki sdfscope:eqversion:6.2

Trust: 0.3

vendor:opensslmodel:project openssl lscope:eqversion:0.9.6

Trust: 0.3

vendor:openvpnmodel:openvpnscope:eqversion:2.0.1

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:4.6

Trust: 0.3

vendor:sunmodel:sdk 003scope:eqversion:1.2.1

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:8.53

Trust: 0.3

vendor:attachmatemodel:reflection sp1scope:neversion:14.0

Trust: 0.3

vendor:oraclemodel:http serverscope:eqversion:9.0.2.3

Trust: 0.3

vendor:sunmodel:sdkscope:eqversion:1.2.2

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:4.4.1

Trust: 0.3

vendor:sunmodel:java system web serverscope:eqversion:6.1

Trust: 0.3

vendor:netbsdmodel:netbsdscope:eqversion:2.0.1

Trust: 0.3

vendor:sybasemodel:rfid enterprisescope:eqversion:2.0

Trust: 0.3

vendor:netbsdmodel:current pre20010701scope: - version: -

Trust: 0.3

vendor:beamodel:systems weblogic server spscope:eqversion:8.15

Trust: 0.3

vendor:turbolinuxmodel:f...scope:eqversion:10

Trust: 0.3

vendor:ciscomodel:ons optical transport platformscope:eqversion:154543.0

Trust: 0.3

vendor:sunmodel:jdk bscope:eqversion:1.1.7

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.2.6

Trust: 0.3

vendor:beamodel:systems weblogic server for win32 spscope:eqversion:8.15

Trust: 0.3

vendor:freebsdmodel:-release-p38scope:eqversion:4.3

Trust: 0.3

vendor:hpmodel:hp-ux b.11.00scope: - version: -

Trust: 0.3

vendor:hpmodel:hp-ux b.11.31scope: - version: -

Trust: 0.3

vendor:s u s emodel:linux personal x86 64scope:eqversion:9.2

Trust: 0.3

vendor:opensslmodel:project openssl escope:eqversion:0.9.6

Trust: 0.3

vendor:beamodel:systems weblogic server spscope:eqversion:8.14

Trust: 0.3

vendor:beamodel:systems weblogic express spscope:eqversion:7.0.0.13

Trust: 0.3

vendor:ciscomodel:ciscoworks common management foundationscope:eqversion:0

Trust: 0.3

vendor:sybasemodel:corp bankingscope:eqversion:0

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.2.4

Trust: 0.3

vendor:opensslmodel:project opensslscope:eqversion:0.9.6

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:4.2.2

Trust: 0.3

vendor:beamodel:systems weblogic server for win32 spscope:eqversion:8.14

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:5.0

Trust: 0.3

vendor:sunmodel:java system application server enterprise editionscope:eqversion:7.0

Trust: 0.3

vendor:redmodel:hat enterprise linux asscope:eqversion:4

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:4.2

Trust: 0.3

vendor:ciscomodel:secure acs for windows ntscope:eqversion:2.4

Trust: 0.3

vendor:debianmodel:linux s/390scope:eqversion:3.1

Trust: 0.3

vendor:s u s emodel:tomboyscope:eqversion:10.0

Trust: 0.3

vendor:mandrivamodel:linux mandrake x86 64scope:eqversion:2007.0

Trust: 0.3

vendor:ciscomodel:secure acs for unixscope:eqversion:2.3.5.1

Trust: 0.3

vendor:susemodel:linux enterprise serverscope:eqversion:10

Trust: 0.3

vendor:vmwaremodel:esx serverscope:eqversion:2.1.3

Trust: 0.3

vendor:openofficemodel:openofficescope:eqversion:2.2.1

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:10.0

Trust: 0.3

vendor:sshmodel:communications security ssh tectia server for ibm z/osscope:neversion:5.1.1

Trust: 0.3

vendor:ubuntumodel:linux lts powerpcscope:eqversion:6.06

Trust: 0.3

vendor:opensslmodel:project openssl beta3scope:eqversion:0.9.7

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:6.10

Trust: 0.3

vendor:vmwaremodel:esx serverscope:eqversion:2.0.2

Trust: 0.3

vendor:sshmodel:communications security ssh tectia kscope:eqversion:4.3.9

Trust: 0.3

vendor:sunmodel:one web server sp8scope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux sparcscope:eqversion:3.1

Trust: 0.3

vendor:beamodel:systems weblogic express spscope:eqversion:8.12

Trust: 0.3

vendor:operamodel:software opera web browser linuxscope:eqversion:6.10

Trust: 0.3

vendor:beamodel:systems weblogic express spscope:eqversion:7.0.0.11

Trust: 0.3

vendor:freebsdmodel:-stablescope:eqversion:4.4

Trust: 0.3

vendor:redmodel:hat red hat network satellite serverscope:eqversion:4.2

Trust: 0.3

vendor:operamodel:software opera web browser win32scope:eqversion:6.0.5

Trust: 0.3

vendor:sunmodel:java system application server 2004q2 r1enterprisescope:eqversion:7.0

Trust: 0.3

vendor:ubuntumodel:linux sparcscope:eqversion:6.10

Trust: 0.3

vendor:freebsdmodel:5.4-stablescope: - version: -

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:4.0

Trust: 0.3

vendor:iscmodel:bind a6scope:eqversion:9.4

Trust: 0.3

vendor:vmwaremodel:playerscope:eqversion:1.0.3

Trust: 0.3

vendor:sunmodel:jdk 02scope:eqversion:1.4.2

Trust: 0.3

vendor:avayamodel:message networkingscope: - version: -

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:4.9

Trust: 0.3

vendor:sshmodel:communications security ssh tectiascope:eqversion:2.1.2

Trust: 0.3

vendor:ciscomodel:ons 15454sdhscope:eqversion:4.0(0)

Trust: 0.3

vendor:turbolinuxmodel:serverscope:eqversion:8.0

Trust: 0.3

vendor:freebsdmodel:-release-p8scope:eqversion:4.10

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:eqversion:1.0.3

Trust: 0.3

vendor:redhatmodel:desktopscope:eqversion:3.0

Trust: 0.3

vendor:sshmodel:communications security ssh tectia jscope:eqversion:4.3.1

Trust: 0.3

vendor:freebsdmodel:-release-p17scope:eqversion:4.7

Trust: 0.3

vendor:trustixmodel:secure enterprise linuxscope:eqversion:2.0

Trust: 0.3

vendor:sybasemodel:rfid enterprisescope:eqversion:2.2

Trust: 0.3

vendor:ciscomodel:call manager es24scope:eqversion:4.1

Trust: 0.3

vendor:sybasemodel:powerbuilderscope:eqversion:9.0

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:4.3.2

Trust: 0.3

vendor:attachmatemodel:reflectionscope:eqversion:14.0

Trust: 0.3

vendor:attachmatemodel:reflectionscope:eqversion:13.0.4

Trust: 0.3

vendor:ciscomodel:gss global site selectorscope:eqversion:44910

Trust: 0.3

vendor:avayamodel:s8300 r2.0.1scope: - version: -

Trust: 0.3

vendor:operamodel:software opera web browser .6win32scope:eqversion:6.0

Trust: 0.3

vendor:sunmodel:sdk 02scope:eqversion:1.4.2

Trust: 0.3

vendor:sunmodel:sdk 11scope:eqversion:1.2.2

Trust: 0.3

vendor:freebsdmodel:-prereleasescope:eqversion:4.8

Trust: 0.3

vendor:beamodel:systems weblogic express spscope:eqversion:8.11

Trust: 0.3

vendor:hpmodel:openvms secure web serverscope:eqversion:1.1-1

Trust: 0.3

vendor:sybasemodel:data integration suite discope:eqversion:1.0

Trust: 0.3

vendor:susemodel:linux enterprise sdkscope:eqversion:10

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:3.2.1

Trust: 0.3

vendor:attachmatemodel:reflectionscope:eqversion:13.0

Trust: 0.3

vendor:sybasemodel:rtdsscope:eqversion:3.0

Trust: 0.3

vendor:beamodel:systems weblogic server spscope:eqversion:7.0.0.14

Trust: 0.3

vendor:sunmodel:java web proxy server sp7scope:eqversion:3.6

Trust: 0.3

vendor:beamodel:systems weblogic serverscope:eqversion:9.0

Trust: 0.3

vendor:sunmodel:java system application server platform edition q1 ur1scope:eqversion:8.12005

Trust: 0.3

vendor:sybasemodel:data auditingscope:eqversion:4.5.2

Trust: 0.3

vendor:sshmodel:communications security ssh tectia jscope:neversion:4.3.3

Trust: 0.3

vendor:beamodel:systems weblogic express spscope:eqversion:7.05

Trust: 0.3

vendor:openbsdmodel:openbsdscope:eqversion:3.9

Trust: 0.3

vendor:freebsdmodel:-stablescope:eqversion:4.3

Trust: 0.3

vendor:attachmatemodel:reflection for secure it sp1scope:neversion:6.1

Trust: 0.3

vendor:sshmodel:communications security ssh tectiascope:eqversion:1.4

Trust: 0.3

vendor:sshmodel:communications security ssh tectia connectorscope:eqversion:5.0.2

Trust: 0.3

vendor:openpkgmodel:stablescope: - version: -

Trust: 0.3

vendor:sunmodel:java system web server sp10scope:eqversion:6.0

Trust: 0.3

vendor:sunmodel:sdk 14scope:eqversion:1.2.2

Trust: 0.3

vendor:freebsdmodel:4.10-prereleasescope: - version: -

Trust: 0.3

vendor:sunmodel:java enterprise system 2005q1scope: - version: -

Trust: 0.3

vendor:sunmodel:sdk 01scope:eqversion:1.4.2

Trust: 0.3

vendor:attachmatemodel:reflection sftp clientscope:eqversion:6.0

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:6.10

Trust: 0.3

vendor:sshmodel:communications security ssh tectiascope:eqversion:2.0

Trust: 0.3

vendor:sunmodel:solaris 8 sparcscope: - version: -

Trust: 0.3

vendor:redmodel:hat red hat network satellite serverscope:eqversion:5.0

Trust: 0.3

vendor:sybasemodel:afariascope:eqversion:5.1

Trust: 0.3

vendor:avayamodel:s8700 cmscope:eqversion:3.1

Trust: 0.3

vendor:s u s emodel:linux professional ossscope:eqversion:10.0

Trust: 0.3

vendor:mandrivamodel:linux mandrakescope:eqversion:2007.0

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:4.0

Trust: 0.3

vendor:susemodel:linux enterprise serverscope:eqversion:8

Trust: 0.3

vendor:hpmodel:system management homepagescope:neversion:2.1.9

Trust: 0.3

vendor:openofficemodel:openofficescope:eqversion:2.0.2

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:4.2.3

Trust: 0.3

vendor:s u s emodel:linux professional x86 64scope:eqversion:9.3

Trust: 0.3

vendor:trustixmodel:secure linuxscope:eqversion:3.0

Trust: 0.3

vendor:beamodel:systems weblogic express spscope:eqversion:7.02

Trust: 0.3

vendor:turbolinuxmodel:appliance server workgroup editionscope:eqversion:1.0

Trust: 0.3

vendor:sunmodel:java system application server platform edition q1scope:eqversion:8.12005

Trust: 0.3

vendor:vmwaremodel:player buildscope:neversion:1.0.680404

Trust: 0.3

vendor:avayamodel:s8710 cmscope:eqversion:3.1

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:4.9

Trust: 0.3

vendor:freebsdmodel:-stablescope:eqversion:4.7

Trust: 0.3

vendor:sybasemodel:iq extended enterpirse editionscope:eqversion:12.7

Trust: 0.3

vendor:beamodel:systems weblogic expressscope:eqversion:7.0

Trust: 0.3

vendor:sunmodel:jdk 13scope:eqversion:1.1.8

Trust: 0.3

vendor:beamodel:systems weblogic express for win32 spscope:eqversion:8.12

Trust: 0.3

vendor:beamodel:systems weblogic express for win32 spscope:eqversion:7.0.0.11

Trust: 0.3

vendor:sunmodel:java system application server standard 2004q2 r5scope:eqversion:7.0.0

Trust: 0.3

vendor:ciscomodel:ons optical transport platformscope:eqversion:154543.2.0

Trust: 0.3

vendor:iscmodel:bind rc3scope:neversion:9.2.7

Trust: 0.3

vendor:freebsdmodel:-stablescope:eqversion:6.1

Trust: 0.3

vendor:sunmodel:sdk 07ascope:eqversion:1.2.2

Trust: 0.3

vendor:ciscomodel:call manager es32scope:eqversion:4.1

Trust: 0.3

vendor:avayamodel:interactive responsescope: - version: -

Trust: 0.3

vendor:ciscomodel:call managerscope:eqversion:3.3

Trust: 0.3

vendor:freebsdmodel:-release-p20scope:eqversion:4.6

Trust: 0.3

vendor:sybasemodel:unwired accelerator and enterprise portalscope:eqversion:6.0

Trust: 0.3

vendor:ciscomodel:security agentscope:eqversion:4.0.2

Trust: 0.3

vendor:ciscomodel:secure acs for windows ntscope:eqversion:2.6

Trust: 0.3

vendor:openofficemodel:openofficescope:eqversion:2.4.1

Trust: 0.3

vendor:operamodel:software opera web browser macscope:eqversion:5.0

Trust: 0.3

vendor:sybasemodel:eii avaki sdfscope:eqversion:6.1

Trust: 0.3

vendor:sunmodel:java system application server enterprise edition 2005q1rhel2.1/rhel3scope:eqversion:8.1

Trust: 0.3

vendor:sshmodel:communications security ssh tectia managerscope:eqversion:2.1.2

Trust: 0.3

vendor:ciscomodel:secure acs for windows ntscope:eqversion:2.6.3

Trust: 0.3

vendor:novellmodel:international cryptographic infostructurescope:eqversion:2.6.1

Trust: 0.3

vendor:sshmodel:communications security ssh tectia kscope:eqversion:4.3.8

Trust: 0.3

vendor:debianmodel:linux ppcscope:eqversion:3.1

Trust: 0.3

vendor:opensslmodel:project openssl ascope:eqversion:0.9.7

Trust: 0.3

vendor:ciscomodel:ons optical transport platformscope:eqversion:154544.1(3)

Trust: 0.3

vendor:mandrakesoftmodel:multi network firewallscope:eqversion:2.0

Trust: 0.3

vendor:operamodel:software opera web browser bscope:eqversion:7.11

Trust: 0.3

vendor:vmwaremodel:workstation buildscope:neversion:5.5.680404

Trust: 0.3

vendor:freebsdmodel:-stablescope:eqversion:5.3

Trust: 0.3

vendor:opensslmodel:project openssl kscope:neversion:0.9.7

Trust: 0.3

vendor:sshmodel:communications security ssh tectia connectorscope:eqversion:5.0

Trust: 0.3

vendor:iscmodel:bind rc1scope:eqversion:9.2.7

Trust: 0.3

vendor:sunmodel:java system application server standard 2004q2 r4scope:eqversion:7.0.0

Trust: 0.3

vendor:rpathmodel:linuxscope:eqversion:1

Trust: 0.3

vendor:iscmodel:bind rc3scope:neversion:9.3.3

Trust: 0.3

vendor:ciscomodel:call manager sr2scope:eqversion:4.1

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9.01

Trust: 0.3

vendor:s u s emodel:linux personalscope:eqversion:9.3

Trust: 0.3

vendor:ciscomodel:call manager sr2bscope:eqversion:4.0

Trust: 0.3

vendor:turbolinuxmodel:serverscope:eqversion:7.0

Trust: 0.3

vendor:sunmodel:java system application server 2004q2 r2 enterprisescope:eqversion:7.0

Trust: 0.3

vendor:sunmodel:java system web server sp6scope:eqversion:6.0

Trust: 0.3

vendor:netbsdmodel:current augustscope:eqversion:232006

Trust: 0.3

vendor:ciscomodel:ons 15454sdhscope:eqversion:4.6(0)

Trust: 0.3

vendor:ubuntumodel:linux lts i386scope:eqversion:6.06

Trust: 0.3

vendor:avayamodel:messaging storage serverscope: - version: -

Trust: 0.3

vendor:sunmodel:jre 05ascope:eqversion:1.2.2

Trust: 0.3

vendor:redhatmodel:enterprise linux esscope:eqversion:4

Trust: 0.3

vendor:openvpnmodel:openvpnscope:eqversion:2.0.2

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.2.2

Trust: 0.3

vendor:sunmodel:sdk 007scope:eqversion:1.1.8

Trust: 0.3

vendor:operamodel:software opera web browser win32scope:eqversion:7.0

Trust: 0.3

vendor:beamodel:systems weblogic express for win32 spscope:eqversion:7.05

Trust: 0.3

vendor:sunmodel:one web server sp3scope:eqversion:6.0

Trust: 0.3

vendor:avayamodel:intuity lxscope: - version: -

Trust: 0.3

vendor:operamodel:software opera web browser win32scope:eqversion:6.0.1

Trust: 0.3

vendor:netbsdmodel:netbsdscope:eqversion:2.0

Trust: 0.3

vendor:ciscomodel:secure acs for windows ntscope:eqversion:3.1

Trust: 0.3

vendor:beamodel:systems weblogic server spscope:eqversion:8.13

Trust: 0.3

vendor:s u s emodel:linux personal x86 64scope:eqversion:9.1

Trust: 0.3

vendor:ciscomodel:security agentscope:eqversion:3.x

Trust: 0.3

vendor:ciscomodel:ons optical transport platformscope:eqversion:154544.0(1)

Trust: 0.3

vendor:netbsdmodel:netbsdscope:eqversion:2.0.2

Trust: 0.3

vendor:attachmatemodel:reflection for secure itscope:eqversion:6.0

Trust: 0.3

vendor:sunmodel:jre 003scope:eqversion:1.2.2

Trust: 0.3

vendor:openofficemodel:openofficescope:eqversion:2.4.3

Trust: 0.3

vendor:sunmodel:jdk 15scope:eqversion:1.1.8

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:7.11

Trust: 0.3

vendor:beamodel:systems weblogic server for win32 spscope:eqversion:8.13

Trust: 0.3

vendor:sshmodel:communications security ssh tectia managerscope:eqversion:2.0

Trust: 0.3

vendor:avayamodel:cvlanscope: - version: -

Trust: 0.3

vendor:sunmodel:jre 099scope:eqversion:1.1.8

Trust: 0.3

vendor:sunmodel:java system application server 2004q2 r3 enterprisescope:eqversion:7.0

Trust: 0.3

vendor:sunmodel:java enterprise system 2003q4scope: - version: -

Trust: 0.3

vendor:netscapemodel:netscapescope:eqversion:7.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.8

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:4.3.4

Trust: 0.3

vendor:sunmodel:java system application server 2004q2 r3 standardscope:eqversion:7.0

Trust: 0.3

vendor:iscmodel:bind a2scope:eqversion:9.4

Trust: 0.3

vendor:sunmodel:jre betascope:eqversion:1.5.0

Trust: 0.3

vendor:operamodel:software opera web browser win32scope:eqversion:5.10

Trust: 0.3

vendor:beamodel:systems weblogic express for win32 spscope:eqversion:7.01

Trust: 0.3

vendor:sunmodel:java system application server 2004q2scope:eqversion:7

Trust: 0.3

vendor:beamodel:systems weblogic express for win32 spscope:eqversion:7.06

Trust: 0.3

vendor:beamodel:systems weblogic express for win32 spscope:eqversion:7.02

Trust: 0.3

vendor:openvpnmodel:openvpnscope:eqversion:2.0.6

Trust: 0.3

vendor:debianmodel:linux mipsscope:eqversion:3.1

Trust: 0.3

vendor:pardusmodel:linuxscope:eqversion:20090

Trust: 0.3

vendor:freebsdmodel:-stablescope:eqversion:4.2

Trust: 0.3

vendor:iscmodel:bind a3scope:eqversion:9.4

Trust: 0.3

vendor:beamodel:systems weblogic server spscope:eqversion:7.03

Trust: 0.3

vendor:vmwaremodel:acescope:eqversion:2.0

Trust: 0.3

vendor:netbsdmodel:3.1 rc3scope: - version: -

Trust: 0.3

vendor:sybasemodel:e-biz impactscope:eqversion:5.5

Trust: 0.3

vendor:sybasemodel:asescope:eqversion:11.5

Trust: 0.3

vendor:beamodel:systems weblogic server for win32 spscope:eqversion:7.03

Trust: 0.3

vendor:hpmodel:hp-ux b.11.23scope: - version: -

Trust: 0.3

vendor:ubuntumodel:linux sparcscope:eqversion:5.10

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:8.02

Trust: 0.3

vendor:ipcopmodel:ipcopscope:eqversion:1.4.12

Trust: 0.3

vendor:sunmodel:jrescope:eqversion:1.1.6

Trust: 0.3

vendor:vmwaremodel:esx serverscope:eqversion:3.0

Trust: 0.3

vendor:sunmodel:java system application server enterprise 2004q2 r5scope:eqversion:7.0.0

Trust: 0.3

vendor:opensslmodel:project opensslscope:eqversion:0.9.8

Trust: 0.3

vendor:freebsdmodel:-release-p7scope:eqversion:4.8

Trust: 0.3

vendor:sybasemodel:unwired accelerator and enterprise portalscope:eqversion:8.0

Trust: 0.3

vendor:sunmodel:one web server sp6scope:eqversion:6.0

Trust: 0.3

vendor:sunmodel:jre 14scope:eqversion:1.1.8

Trust: 0.3

vendor:beamodel:systems weblogic server for win32scope:eqversion:7.0

Trust: 0.3

vendor:sunmodel:jre 13scope:eqversion:1.1.8

Trust: 0.3

vendor:sybasemodel:powerbuilderscope:eqversion:10.5

Trust: 0.3

vendor:ciscomodel:secure acs for windows ntscope:eqversion:3.2

Trust: 0.3

vendor:redhatmodel:enterprise linux extrasscope:eqversion:3

Trust: 0.3

vendor:sunmodel:jdk 12scope:eqversion:1.1.8

Trust: 0.3

vendor:iscmodel:bind b3scope:neversion:9.4

Trust: 0.3

vendor:sybasemodel:mach desktopscope:eqversion:2.2.1

Trust: 0.3

vendor:ciscomodel:ons 15454sdhscope:eqversion:4.6(1)

Trust: 0.3

vendor:sunmodel:jdk 11scope:eqversion:1.1.8

Trust: 0.3

vendor:sgimodel:advanced linux environmentscope:eqversion:3.0

Trust: 0.3

vendor:sunmodel:secure global desktopscope:neversion:4.3

Trust: 0.3

vendor:opensslmodel:project opensslscope:eqversion:0.9.4

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.2.5

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:8.0.2

Trust: 0.3

vendor:sshmodel:communications security ssh tectia managerscope:neversion:2.1.4

Trust: 0.3

vendor:ipcopmodel:ipcopscope:neversion:1.4.13

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:10.1

Trust: 0.3

vendor:beamodel:systems weblogic server for win32 spscope:eqversion:7.04

Trust: 0.3

vendor:ciscomodel:security agentscope:eqversion:4.0.1

Trust: 0.3

vendor:vmwaremodel:playerscope:eqversion:2.0.1

Trust: 0.3

vendor:sunmodel:one web server sp10scope:eqversion:6.0

Trust: 0.3

vendor:openpkgmodel:openpkgscope:eqversion:2.0

Trust: 0.3

vendor:sybasemodel:eii avaki sdfscope:eqversion:7.0

Trust: 0.3

vendor:avayamodel:aura sip enablement servicesscope:eqversion:3.1

Trust: 0.3

vendor:sunmodel:java system application server standard platform q1scope:eqversion:8.12005

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:7.52

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:4.10

Trust: 0.3

vendor:redhatmodel:red hat network satellite (for rhelscope:eqversion:3)4.2

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:4.6

Trust: 0.3

vendor:arkoonmodel:ssl360scope:eqversion:2.0/2

Trust: 0.3

vendor:hpmodel:webproxy a.02.10scope: - version: -

Trust: 0.3

vendor:openofficemodel:openofficescope:eqversion:2.4.2

Trust: 0.3

vendor:sunmodel:java system application server enterprise 2004q2 r4scope:eqversion:7.0.0

Trust: 0.3

vendor:sunmodel:java system web server sp3scope:eqversion:6.1

Trust: 0.3

vendor:securemodel:computing snapgear sg710scope:eqversion:0

Trust: 0.3

vendor:ciscomodel:call manager es62scope:eqversion:4.0

Trust: 0.3

vendor:sunmodel:java system web server sp4scope:eqversion:6.0

Trust: 0.3

vendor:ciscomodel:secure acs buildscope:neversion:4.1(1)23

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.11

Trust: 0.3

vendor:sunmodel:one web server sp5scope:eqversion:6.0

Trust: 0.3

vendor:s u s emodel:linux personalscope:eqversion:8.2

Trust: 0.3

vendor:opensslmodel:project openssl cscope:neversion:0.9.8

Trust: 0.3

vendor:hpmodel:openvms secure web serverscope:neversion:2.2

Trust: 0.3

vendor:vmwaremodel:acescope:neversion:2.0.3

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:5.10

Trust: 0.3

vendor:sybasemodel:bpi for healthcarescope:eqversion:2.2

Trust: 0.3

vendor:sunmodel:jdk 099scope:eqversion:1.1.8

Trust: 0.3

vendor:sunmodel:jre 006scope:eqversion:1.2.2

Trust: 0.3

vendor:avayamodel:s8500scope:eqversion:0

Trust: 0.3

vendor:operamodel:software opera web browser win32scope:eqversion:6.0.3

Trust: 0.3

vendor:ciscomodel:secure acs for windows ntscope:eqversion:3.3

Trust: 0.3

vendor:sybasemodel:powerbuilderscope:eqversion:10.2.0

Trust: 0.3

vendor:beamodel:systems weblogic server spscope:eqversion:7.0.0.13

Trust: 0.3

vendor:hpmodel:webproxy a.02.00scope: - version: -

Trust: 0.3

vendor:beamodel:systems weblogic serverscope:eqversion:7.0.0.1

Trust: 0.3

vendor:hpmodel:virtualvault a.04.70scope: - version: -

Trust: 0.3

vendor:redhatmodel:network satellite (for rhelscope:eqversion:4)5.1

Trust: 0.3

vendor:sunmodel:jdkscope:eqversion:1.1.6

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:11.0

Trust: 0.3

vendor:sunmodel:sdk 02scope:eqversion:1.3

Trust: 0.3

vendor:avayamodel:s8710 r2.0.1scope: - version: -

Trust: 0.3

vendor:ibmmodel:hardware management console for pseries r1.0scope:eqversion:6.0

Trust: 0.3

vendor:redhatmodel:advanced workstation for the itanium processor ia64scope:eqversion:2.1

Trust: 0.3

vendor:sybasemodel:e-biz impactscope:eqversion:5.4.5

Trust: 0.3

vendor:sunmodel:java system application server enterprise edition q1scope:eqversion:8.12005

Trust: 0.3

vendor:opensslmodel:project openssl jscope:eqversion:0.9.7

Trust: 0.3

vendor:slackwaremodel:linux -currentscope: - version: -

Trust: 0.3

vendor:iscmodel:bind -p2scope:neversion:9.3.2

Trust: 0.3

vendor:turbolinuxmodel:homescope: - version: -

Trust: 0.3

vendor:vmwaremodel:serverscope:eqversion:1.0.4

Trust: 0.3

vendor:ciscomodel:ons optical transport platformscope:eqversion:154543.3

Trust: 0.3

vendor:sybasemodel:easerverscope:eqversion:5.0

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:4.4.1

Trust: 0.3

vendor:ciscomodel:ons 15454sdhscope:eqversion:4.5

Trust: 0.3

vendor:sshmodel:communications security ssh tectia jscope:eqversion:4.0

Trust: 0.3

vendor:ciscomodel:ons optical transport platformscope:eqversion:154544.0

Trust: 0.3

vendor:gentoomodel:linuxscope: - version: -

Trust: 0.3

vendor:sunmodel:jdk 1.5.0.0 03scope: - version: -

Trust: 0.3

vendor:turbolinuxmodel:desktopscope:eqversion:10.0

Trust: 0.3

vendor:opensslmodel:project openssl kscope:eqversion:0.9.6

Trust: 0.3

vendor:redhatmodel:advanced workstation for the itanium processorscope:eqversion:2.1

Trust: 0.3

vendor:turbolinuxmodel:serverscope:eqversion:10.0

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:4.1

Trust: 0.3

vendor:s u s emodel:novell linux posscope:eqversion:9

Trust: 0.3

vendor:ciscomodel:ons optical transport platformscope:eqversion:154542.3(5)

Trust: 0.3

vendor:arkoonmodel:ssl360scope:eqversion:1.0

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:4.10

Trust: 0.3

vendor:openofficemodel:openofficescope:eqversion:2.0.3-1

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.1

Trust: 0.3

vendor:sunmodel:jdk 10scope:eqversion:1.1.8

Trust: 0.3

vendor:sunmodel:solaris 10 x86scope: - version: -

Trust: 0.3

vendor:sybasemodel:ffi uofxscope:eqversion:0

Trust: 0.3

vendor:debianmodel:linux ia-32scope:eqversion:3.1

Trust: 0.3

vendor:ciscomodel:gss global site selectorscope:eqversion:44920

Trust: 0.3

vendor:redhatmodel:network satellite (for rhelscope:eqversion:4)4.2

Trust: 0.3

vendor:s u s emodel:suse linux openexchange serverscope:eqversion:4.0

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:7.50

Trust: 0.3

vendor:freebsdmodel:-prereleasescope:eqversion:4.9

Trust: 0.3

vendor:sunmodel:jrescope:eqversion:1.3.0

Trust: 0.3

vendor:s u s emodel:linux professional x86 64scope:eqversion:9.0

Trust: 0.3

vendor:turbolinuxmodel:multimediascope: - version: -

Trust: 0.3

vendor:ciscomodel:ons optical transport platformscope:eqversion:154544.0(2)

Trust: 0.3

vendor:freebsdmodel:-stablescope:eqversion:4.1.1

Trust: 0.3

vendor:ciscomodel:wide area file servicesscope:eqversion:0

Trust: 0.3

vendor:s u s emodel:linux desktopscope:eqversion:1.0

Trust: 0.3

vendor:ciscomodel:call manager sr2cscope:eqversion:4.0

Trust: 0.3

vendor:sunmodel:java web proxy server sp2scope:eqversion:3.6

Trust: 0.3

vendor:freebsdmodel:alphascope:eqversion:5.0

Trust: 0.3

vendor:attachmatemodel:reflectionscope:neversion:13.0.5

Trust: 0.3

vendor:beamodel:systems weblogic expressscope:eqversion:8.1

Trust: 0.3

vendor:beamodel:systems weblogic server spscope:eqversion:8.11

Trust: 0.3

vendor:ciscomodel:secure acs for unixscope:eqversion:2.0

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:4.5

Trust: 0.3

vendor:turbolinuxmodel:fujiscope: - version: -

Trust: 0.3

vendor:opensslmodel:project openssl bscope:eqversion:0.9.7

Trust: 0.3

vendor:beamodel:systems weblogic server for win32 spscope:eqversion:8.11

Trust: 0.3

vendor:mozillamodel:seamonkeyscope:neversion:1.0.6

Trust: 0.3

vendor:sybasemodel:asescope:eqversion:12.5.2

Trust: 0.3

vendor:sybasemodel:unwired orchestratorscope:eqversion:5.0

Trust: 0.3

vendor:beamodel:systems weblogic express for win32scope:eqversion:7.0

Trust: 0.3

vendor:sybasemodel:afariascope:eqversion:5.4

Trust: 0.3

vendor:sunmodel:jsse 03scope:eqversion:1.0.3

Trust: 0.3

vendor:oraclemodel:http serverscope:eqversion:9.2.0

Trust: 0.3

vendor:ubuntumodel:linux lts amd64scope:eqversion:6.06

Trust: 0.3

vendor:sunmodel:one web server sp1scope:eqversion:6.0

Trust: 0.3

vendor:openpkgmodel:e1.0-solidscope: - version: -

Trust: 0.3

vendor:sunmodel:jre 003scope:eqversion:1.2.1

Trust: 0.3

vendor:s u s emodel:suse linux retail solutionscope:eqversion:8.0

Trust: 0.3

vendor:beamodel:systems weblogic expressscope:eqversion:9.2

Trust: 0.3

vendor:vmwaremodel:serverscope:neversion:1.0.5

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:5.1

Trust: 0.3

vendor:ingatemodel:firewallscope:neversion:4.5.1

Trust: 0.3

vendor:ciscomodel:ons 15454sdhscope:eqversion:4.1(2)

Trust: 0.3

vendor:sybasemodel:afariascope:eqversion:5.2

Trust: 0.3

vendor:beamodel:systems weblogic serverscope:eqversion:8.1

Trust: 0.3

vendor:s u s emodel:suse linux standard serverscope:eqversion:8.0

Trust: 0.3

vendor:ibmmodel:hardware management console for pseries r5.0scope:eqversion:4.0

Trust: 0.3

vendor:s u s emodel:linux professionalscope:eqversion:10.1

Trust: 0.3

vendor:netscapemodel:netscapescope:eqversion:7.2

Trust: 0.3

vendor:freebsdmodel:-release/alphascope:eqversion:5.1

Trust: 0.3

vendor:sybasemodel:ffi bptwscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:ons 15454sdhscope:eqversion:4.1(3)

Trust: 0.3

vendor:ciscomodel:security agentscope:eqversion:2.1

Trust: 0.3

vendor:s u s emodel:linux professionalscope:eqversion:9.3

Trust: 0.3

vendor:sunmodel:java web proxy server sp6scope:eqversion:3.6

Trust: 0.3

vendor:s u s emodel:linux personalscope:eqversion:9.0

Trust: 0.3

vendor:openpkgmodel:openpkgscope:eqversion:2.5

Trust: 0.3

vendor:ciscomodel:ciscoworks common management foundationscope:eqversion:2.0

Trust: 0.3

vendor:vmwaremodel:playerscope:eqversion:1.0.4

Trust: 0.3

vendor:sunmodel:java system application server 2004q2 r2 standardscope:eqversion:7.0

Trust: 0.3

vendor:sshmodel:communications security ssh tectia jscope:eqversion:4.3.2

Trust: 0.3

vendor:ciscomodel:call manager 4.1 sr4scope: - version: -

Trust: 0.3

vendor:hpmodel:openvms secure web serverscope:eqversion:2.1-1

Trust: 0.3

vendor:hpmodel:virtualvault a.04.60scope: - version: -

Trust: 0.3

vendor:s u s emodel:open-enterprise-serverscope:eqversion:0

Trust: 0.3

vendor:sybasemodel:afariascope:eqversion:5.3

Trust: 0.3

vendor:openofficemodel:openofficescope:eqversion:2.0.3

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:3.2.1

Trust: 0.3

vendor:freebsdmodel:-release-p14scope:eqversion:5.0

Trust: 0.3

vendor:attachmatemodel:reflectionscope:eqversion:10.0

Trust: 0.3

vendor:sunmodel:java enterprise system 2005q4scope: - version: -

Trust: 0.3

vendor:beamodel:systems weblogic expressscope:eqversion:9.0

Trust: 0.3

vendor:redmodel:hat fedora core5scope: - version: -

Trust: 0.3

vendor:beamodel:systems weblogic server spscope:eqversion:7.02

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:4.6

Trust: 0.3

vendor:oraclemodel:http serverscope:eqversion:1.0.2.0

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.0.1

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:4.4

Trust: 0.3

vendor:ipcopmodel:ipcopscope:eqversion:1.4.10

Trust: 0.3

vendor:beamodel:systems weblogic serverscope:eqversion:9.2

Trust: 0.3

vendor:ciscomodel:secure acs for windows ntscope:eqversion:3.0.3

Trust: 0.3

vendor:ingatemodel:firewalllscope:eqversion:4.4

Trust: 0.3

vendor:sunmodel:one web proxy serverscope:eqversion:3.6

Trust: 0.3

vendor:sunmodel:sdk 01ascope:eqversion:1.3.1

Trust: 0.3

vendor:beamodel:systems weblogic express spscope:eqversion:8.15

Trust: 0.3

vendor:hpmodel:system management homepagescope:neversion:2.1.7

Trust: 0.3

vendor:openofficemodel:betascope:eqversion:2.0

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:5.04

Trust: 0.3

vendor:sunmodel:solaris 9 x86 updatescope:eqversion:5

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:5.5

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:4.0.x

Trust: 0.3

vendor:sshmodel:communications security ssh tectia managerscope:eqversion:1.2

Trust: 0.3

vendor:ciscomodel:ons optical transport platformscope:eqversion:154543.4

Trust: 0.3

vendor:vmwaremodel:acescope:neversion:1.0.5

Trust: 0.3

vendor:mozillamodel:network security servicesscope:neversion:3.11.3

Trust: 0.3

vendor:beamodel:systems weblogic express spscope:eqversion:8.14

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.11

Trust: 0.3

vendor:openbsdmodel:openbsdscope:eqversion:3.8

Trust: 0.3

vendor:ciscomodel:ons ios-based bladesscope:eqversion:15454

Trust: 0.3

vendor:sunmodel:jre 004scope:eqversion:1.2.2

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:7.23

Trust: 0.3

vendor:beamodel:systems weblogic server spscope:eqversion:7.07

Trust: 0.3

vendor:ingatemodel:siparatorscope:eqversion:4.2.3

Trust: 0.3

vendor:sybasemodel:rfid enterprisescope:eqversion:2.1

Trust: 0.3

vendor:freebsdmodel:-stablescope:eqversion:4.11

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:6.0

Trust: 0.3

vendor:opensslmodel:project openssl dscope:eqversion:0.9.7

Trust: 0.3

vendor:vmwaremodel:playerscope:eqversion:2.0

Trust: 0.3

vendor:beamodel:systems weblogic server for win32 spscope:eqversion:7.07

Trust: 0.3

vendor:beamodel:systems weblogic express for win32 spscope:eqversion:7.0.0.12

Trust: 0.3

vendor:navisionmodel:financials serverscope:eqversion:3.0

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:8.1

Trust: 0.3

vendor:themodel:legion of the bouncy castle java cryptography apiscope:eqversion:1.37

Trust: 0.3

vendor:vmwaremodel:playerscope:eqversion:2.0.2

Trust: 0.3

vendor:freebsdmodel:-stablepre2002-03-07scope:eqversion:4.5

Trust: 0.3

vendor:ciscomodel:unified presence serverscope:eqversion:1.0(2)

Trust: 0.3

vendor:sshmodel:communications security ssh tectia serverscope:eqversion:4.0

Trust: 0.3

vendor:sshmodel:communications security ssh tectia server for ibm z/osscope:eqversion:5.2

Trust: 0.3

vendor:sshmodel:communications security ssh tectia connectorscope:eqversion:5.1

Trust: 0.3

vendor:mozillamodel:thunderbirdscope:neversion:1.5.0.8

Trust: 0.3

vendor:sybasemodel:ffi cons bankingscope:eqversion:0

Trust: 0.3

vendor:freebsdmodel:alphascope:eqversion:4.0

Trust: 0.3

vendor:opensslmodel:project openssl ascope:eqversion:0.9.6

Trust: 0.3

vendor:ciscomodel:call managerscope:eqversion:4.2(3)

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.3.9

Trust: 0.3

vendor:sunmodel:java enterprise system 2004q2scope: - version: -

Trust: 0.3

vendor:van dykemodel:securefxscope:eqversion:4.0.2

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.1.1

Trust: 0.3

vendor:sunmodel:java system web server sp7scope:eqversion:6.0

Trust: 0.3

vendor:opensslmodel:project openssl fscope:eqversion:0.9.7

Trust: 0.3

vendor:ciscomodel:ciscoworks common management foundationscope:eqversion:2.2

Trust: 0.3

vendor:beamodel:systems weblogic express spscope:eqversion:7.01

Trust: 0.3

vendor:vmwaremodel:serverscope:eqversion:1.0.2

Trust: 0.3

vendor:susemodel:linux enterprise serverscope:eqversion:9

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.5.0.5

Trust: 0.3

vendor:hpmodel:hp-ux b.11.11scope: - version: -

Trust: 0.3

vendor:operamodel:software opera web browser 3win32scope:eqversion:7.0

Trust: 0.3

vendor:vmwaremodel:esx serverscope:eqversion:2.5.4

Trust: 0.3

vendor:sunmodel:java web proxy server sp1scope:eqversion:4.0

Trust: 0.3

vendor:beamodel:systems weblogic express spscope:eqversion:7.06

Trust: 0.3

vendor:ciscomodel:call manager es40scope:eqversion:4.0

Trust: 0.3

vendor:s u s emodel:novell linux desktopscope:eqversion:9.0

Trust: 0.3

vendor:sunmodel:jre 09scope:eqversion:1.1.6

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:4.3

Trust: 0.3

vendor:netbsdmodel:netbsdscope:eqversion:2.0.3

Trust: 0.3

vendor:ciscomodel:security agentscope:eqversion:5.0

Trust: 0.3

vendor:operamodel:software opera web browser 2win32scope:eqversion:7.0

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:8.01

Trust: 0.3

vendor:ciscomodel:secure acs for windows serverscope:eqversion:3.2

Trust: 0.3

vendor:freebsdmodel:-stablepre050201scope:eqversion:4.2

Trust: 0.3

vendor:ciscomodel:idsscope:eqversion:0

Trust: 0.3

vendor:sybasemodel:appeonscope:eqversion:2.8

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:1.5.0.7

Trust: 0.3

vendor:operamodel:software opera web browser win32scope:eqversion:6.0.4

Trust: 0.3

vendor:debianmodel:linux armscope:eqversion:3.1

Trust: 0.3

vendor:vmwaremodel:workstationscope:eqversion:6.0.2

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:4.4

Trust: 0.3

vendor:sybasemodel:bpi for healthcarescope:eqversion:2.2.1

Trust: 0.3

vendor:sunmodel:java web proxy server sp5scope:eqversion:3.6

Trust: 0.3

vendor:sunmodel:sdk .0 05scope:eqversion:1.3

Trust: 0.3

vendor:sunmodel:jre 003scope:eqversion:1.1.8

Trust: 0.3

vendor:turbolinuxmodel:serverscope:eqversion:10.0x86

Trust: 0.3

vendor:ciscomodel:ons 15454sdhscope:eqversion:4.0

Trust: 0.3

vendor:iscmodel:bind -p1scope:eqversion:9.3.2

Trust: 0.3

vendor:ciscomodel:ons 15454sdhscope:eqversion:3.2

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:9.0

Trust: 0.3

vendor:ciscomodel:series airespace wireless lan controllerscope:eqversion:40003.1.59.24

Trust: 0.3

vendor:sunmodel:sdkscope:eqversion:1.3

Trust: 0.3

vendor:ibmmodel:hardware management console for iseries r1.0scope:eqversion:5.0

Trust: 0.3

vendor:ciscomodel:ons optical transport platformscope:eqversion:154544.5

Trust: 0.3

vendor:s u s emodel:open-enterprise-serverscope:eqversion:9.0

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:7.20

Trust: 0.3

vendor:s u s emodel:unitedlinuxscope:eqversion:1.0

Trust: 0.3

vendor:sshmodel:communications security ssh tectia serverscope:neversion:5.1.1

Trust: 0.3

vendor:sunmodel:java system web server sp1scope:eqversion:6.0

Trust: 0.3

vendor:ciscomodel:series airespace wireless lan controllerscope:eqversion:20003.1.59.24

Trust: 0.3

vendor:s u s emodel:linux personal x86 64scope:eqversion:9.3

Trust: 0.3

vendor:s u s emodel:linux personalscope:eqversion:10.1

Trust: 0.3

vendor:beamodel:systems weblogic express spscope:eqversion:7.0.0.14

Trust: 0.3

vendor:sunmodel:sdk .0 01scope:eqversion:1.4

Trust: 0.3

vendor:turbolinuxmodel:appliance serverscope:eqversion:2.0

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:5.12

Trust: 0.3

vendor:ciscomodel:security agentscope:eqversion:5.0.193

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:6.10

Trust: 0.3

vendor:ciscomodel:call manager sr1scope:eqversion:4.1

Trust: 0.3

vendor:ciscomodel:gss global site selectorscope:eqversion:4480

Trust: 0.3

vendor:s u s emodel:linux professionalscope:eqversion:10.0

Trust: 0.3

vendor:beamodel:systems weblogic express for win32 spscope:eqversion:8.15

Trust: 0.3

vendor:beamodel:systems weblogic server for win32scope:eqversion:9.0

Trust: 0.3

vendor:ciscomodel:secure acs for windows ntscope:eqversion:2.6.4

Trust: 0.3

vendor:sybasemodel:iqscope:eqversion:12.7

Trust: 0.3

vendor:s u s emodel:linux professionalscope:eqversion:8.2

Trust: 0.3

vendor:oraclemodel:http serverscope:eqversion:1.0.2.2

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:5.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.10

Trust: 0.3

vendor:vmwaremodel:acescope:eqversion:1.0

Trust: 0.3

vendor:avayamodel:s8300 r2.0.0scope: - version: -

Trust: 0.3

vendor:beamodel:systems weblogic express for win32 spscope:eqversion:8.14

Trust: 0.3

vendor:oraclemodel:http serverscope:eqversion:9.0.3.1

Trust: 0.3

vendor:sshmodel:communications security ssh tectia serverscope:eqversion:4.3

Trust: 0.3

vendor:sunmodel:jre .0 03scope:eqversion:1.3

Trust: 0.3

vendor:opensslmodel:project opensslscope:eqversion:0.9.5

Trust: 0.3

vendor:openofficemodel:openofficescope:eqversion:2.3.1

Trust: 0.3

vendor:ciscomodel:secure acs for windows ntscope:eqversion:3.0

Trust: 0.3

vendor:freebsdmodel:freebsdscope:eqversion:5.3

Trust: 0.3

vendor:sybasemodel:mfolioscope:eqversion:2.0

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:3.3.1

Trust: 0.3

vendor:sshmodel:communications security ssh tectia server for ibm z/osscope:neversion:5.2.1

Trust: 0.3

vendor:redhatmodel:enterprise linux ws ia64scope:eqversion:2.1

Trust: 0.3

vendor:avayamodel:s8710 r2.0.0scope: - version: -

Trust: 0.3

vendor:operamodel:software opera web browser win32scope:eqversion:5.11

Trust: 0.3

vendor:openpkgmodel:openpkgscope:eqversion:2.3

Trust: 0.3

vendor:iscmodel:bind rc1scope:eqversion:9.3.3

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:4.3

Trust: 0.3

vendor:sunmodel:solaris 9 sparcscope: - version: -

Trust: 0.3

vendor:iscmodel:bind b1scope:eqversion:9.4

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:3.2

Trust: 0.3

vendor:sunmodel:jdk 003scope:eqversion:1.1.8

Trust: 0.3

vendor:ciscomodel:ons 15454sdhscope:eqversion:3.3

Trust: 0.3

vendor:sshmodel:communications security ssh tectiascope:eqversion:1.3

Trust: 0.3

vendor:vmwaremodel:playerscope:eqversion:1.0.2

Trust: 0.3

vendor:ciscomodel:sip proxy serverscope: - version: -

Trust: 0.3

vendor:ciscomodel:secure acs for unixscope:eqversion:2.3.6.1

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.2.3

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:6.0

Trust: 0.3

vendor:iscmodel:bind b2scope:eqversion:9.4

Trust: 0.3

vendor:operamodel:software opera web browser win32 betascope:eqversion:7.02

Trust: 0.3

vendor:freebsdmodel:-stablescope:eqversion:4.5

Trust: 0.3

vendor:ciscomodel:secure acs solution enginescope:eqversion:3.3.2

Trust: 0.3

vendor:beamodel:systems weblogic expressscope:eqversion:9.1

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:5.10

Trust: 0.3

vendor:openofficemodel:openofficescope:eqversion:2.1

Trust: 0.3

vendor:sybasemodel:iqscope:eqversion:12.6

Trust: 0.3

vendor:mozillamodel:firefoxscope:neversion:1.5.8

Trust: 0.3

vendor:debianmodel:linux m68kscope:eqversion:3.1

Trust: 0.3

vendor:ciscomodel:ons 15454sdhscope:eqversion:4.0(2)

Trust: 0.3

vendor:avayamodel:messaging storage server mm3.0scope: - version: -

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:4.7

Trust: 0.3

vendor:redhatmodel:enterprise linux wsscope:eqversion:3

Trust: 0.3

vendor:avayamodel:s8500 cmscope:eqversion:3.1

Trust: 0.3

vendor:mozillamodel:network security servicesscope:eqversion:3.11

Trust: 0.3

vendor:redmodel:hat enterprise linux as ia64scope:eqversion:2.1

Trust: 0.3

vendor:openvpnmodel:openvpnscope:eqversion:2.0.7

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:5.4

Trust: 0.3

vendor:ciscomodel:ons msppscope:eqversion:154540

Trust: 0.3

vendor:sunmodel:jssescope:eqversion:1.0.3

Trust: 0.3

vendor:netbsdmodel:current pre20010805scope: - version: -

Trust: 0.3

vendor:operamodel:software opera web browser win32scope:eqversion:6.0.2

Trust: 0.3

vendor:sunmodel:java web proxy serverscope:eqversion:4.0

Trust: 0.3

vendor:debianmodel:linuxscope:eqversion:3.1

Trust: 0.3

vendor:operamodel:software opera web browser linuxscope:eqversion:5.0

Trust: 0.3

vendor:ciscomodel:call manager es55scope:eqversion:4.1

Trust: 0.3

vendor:sybasemodel:eii avaki sdfscope:eqversion:5.1

Trust: 0.3

vendor:vmwaremodel:player buildscope:neversion:2.0.380004

Trust: 0.3

vendor:themodel:legion of the bouncy castle java cryptography apiscope:neversion:1.38

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:5.2

Trust: 0.3

vendor:debianmodel:linux alphascope:eqversion:3.1

Trust: 0.3

vendor:ciscomodel:security agentscope:eqversion:4.5.1.657

Trust: 0.3

vendor:operamodel:software opera web browser linuxscope:eqversion:6.0.2

Trust: 0.3

vendor:beamodel:systems weblogic serverscope:eqversion:9.1

Trust: 0.3

vendor:sunmodel:java system web server sp1scope:eqversion:6.1

Trust: 0.3

vendor:ingatemodel:firewallscope:eqversion:4.2.1

Trust: 0.3

vendor:sunmodel:java web proxy server sp1scope:eqversion:3.6

Trust: 0.3

vendor:sunmodel:solaris updatescope:eqversion:95

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.1.3

Trust: 0.3

vendor:sybasemodel:solonde etlscope:eqversion:4.0

Trust: 0.3

vendor:sunmodel:jdkscope:eqversion:1.2.1

Trust: 0.3

vendor:mandrivamodel:linux mandrake x86 64scope:eqversion:2006.0

Trust: 0.3

vendor:opensslmodel:project openssl beta1scope:eqversion:0.9.7

Trust: 0.3

vendor:freebsdmodel:-relengscope:eqversion:5.3

Trust: 0.3

vendor:sybasemodel:iqscope:eqversion:12.5

Trust: 0.3

vendor:freebsdmodel:-stablescope:eqversion:4.6

Trust: 0.3

vendor:hpmodel:system management homepagescope:eqversion:2.0.2

Trust: 0.3

vendor:avayamodel:aura sip enablement servicesscope:eqversion:3.0

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.3

Trust: 0.3

vendor:avayamodel:s8700 r2.0.1scope: - version: -

Trust: 0.3

vendor:van dykemodel:vshellscope:eqversion:3.0

Trust: 0.3

vendor:iscmodel:bindscope:eqversion:9.1.3

Trust: 0.3

vendor:hpmodel:system management homepagescope:neversion:2.1.8

Trust: 0.3

vendor:ciscomodel:application control engine modulescope:eqversion:0

Trust: 0.3

vendor:sunmodel:solaris 9 x86scope: - version: -

Trust: 0.3

vendor:opensslmodel:project openssl mscope:eqversion:0.9.6

Trust: 0.3

vendor:s u s emodel:linux professionalscope:eqversion:9.2

Trust: 0.3

vendor:beamodel:systems weblogic express spscope:eqversion:8.13

Trust: 0.3

vendor:opensslmodel:project openssl bscope:eqversion:0.9.2

Trust: 0.3

vendor:freebsdmodel:-releasescope:eqversion:4.3

Trust: 0.3

vendor:avayamodel:interactive responsescope:eqversion:2.0

Trust: 0.3

vendor:sybasemodel:easerverscope:eqversion:5.1

Trust: 0.3

vendor:sunmodel:java system web serverscope:eqversion:6.0

Trust: 0.3

vendor:opensslmodel:project openssl jscope:eqversion:0.9.6

Trust: 0.3

vendor:sshmodel:communications security ssh tectia serverscope:eqversion:4.4.3

Trust: 0.3

sources: CERT/CC: VU#386964 // CERT/CC: VU#773548 // CERT/CC: VU#845620 // BID: 19849 // JVNDB: JVNDB-2006-000557 // CNNVD: CNNVD-200609-270 // NVD: CVE-2006-4340

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2006-4340
value: MEDIUM

Trust: 1.0

CARNEGIE MELLON: VU#386964
value: 0.32

Trust: 0.8

CARNEGIE MELLON: VU#773548
value: 1.57

Trust: 0.8

CARNEGIE MELLON: VU#845620
value: 7.56

Trust: 0.8

NVD: CVE-2006-4340
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200609-270
value: MEDIUM

Trust: 0.6

nvd@nist.gov: CVE-2006-4340
severity: MEDIUM
baseScore: 4.0
vectorString: AV:N/AC:H/AU:N/C:P/I:P/A:N
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 4.9
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

NVD: CVE-2006-4340
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

sources: CERT/CC: VU#386964 // CERT/CC: VU#773548 // CERT/CC: VU#845620 // JVNDB: JVNDB-2006-000557 // CNNVD: CNNVD-200609-270 // NVD: CVE-2006-4340

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.0

sources: NVD: CVE-2006-4340

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 52708 // CNNVD: CNNVD-200609-270

TYPE

input validation

Trust: 0.6

sources: CNNVD: CNNVD-200609-270

CONFIGURATIONS

sources: JVNDB: JVNDB-2006-000557

PATCH

title:HPSBUX02156url:http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00774579

Trust: 0.8

title:HPSBUX02153url:http://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00771742

Trust: 0.8

title:HPSBUX02156url:http://h50221.www5.hp.com/upassist/itrc_japan/assist2/secbltn/HP-UX/HPSBUX02156.html

Trust: 0.8

title:HPSBUX02153url:http://h50221.www5.hp.com/upassist/itrc_japan/assist2/secbltn/HP-UX/HPSBUX02153.html

Trust: 0.8

title:seamonkey (V2.x)url:http://www.miraclelinux.com/support/update/list.php?errata_id=984

Trust: 0.8

title:mfsa2006-60url:http://www.mozilla.org/security/announce/2006/mfsa2006-60.html

Trust: 0.8

title:mfsa2006-60url:http://www.mozilla-japan.org/security/announce/2006/mfsa2006-60.html

Trust: 0.8

title:RHSA-2006:0675url:https://rhn.redhat.com/errata/RHSA-2006-0675.html

Trust: 0.8

title:RHSA-2006:0676url:https://rhn.redhat.com/errata/RHSA-2006-0676.html

Trust: 0.8

title:RHSA-2006:0677url:https://rhn.redhat.com/errata/RHSA-2006-0677.html

Trust: 0.8

title:102781url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-102781-1

Trust: 0.8

title:RHSA-2006:0675url:http://www.jp.redhat.com/support/errata/RHSA/RHSA-2006-0675J.html

Trust: 0.8

title:RHSA-2006:0676url:http://www.jp.redhat.com/support/errata/RHSA/RHSA-2006-0676J.html

Trust: 0.8

title:RHSA-2006:0677url:http://www.jp.redhat.com/support/errata/RHSA/RHSA-2006-0677J.html

Trust: 0.8

sources: JVNDB: JVNDB-2006-000557

EXTERNAL IDS

db:NVDid:CVE-2006-4340

Trust: 3.4

db:SECUNIAid:21906

Trust: 2.4

db:CERT/CCid:VU#845620

Trust: 2.0

db:BIDid:22083

Trust: 1.6

db:SECUNIAid:22074

Trust: 1.6

db:SECUNIAid:22247

Trust: 1.6

db:SECUNIAid:21950

Trust: 1.6

db:SECUNIAid:22422

Trust: 1.6

db:SECUNIAid:21949

Trust: 1.6

db:SECUNIAid:21915

Trust: 1.6

db:SECUNIAid:22226

Trust: 1.6

db:SECUNIAid:22088

Trust: 1.6

db:SECUNIAid:21939

Trust: 1.6

db:SECUNIAid:22055

Trust: 1.6

db:SECUNIAid:22274

Trust: 1.6

db:SECUNIAid:22025

Trust: 1.6

db:SECUNIAid:21903

Trust: 1.6

db:SECUNIAid:22342

Trust: 1.6

db:SECUNIAid:22036

Trust: 1.6

db:SECUNIAid:22001

Trust: 1.6

db:SECUNIAid:21940

Trust: 1.6

db:SECUNIAid:22210

Trust: 1.6

db:SECUNIAid:22299

Trust: 1.6

db:SECUNIAid:21916

Trust: 1.6

db:SECTRACKid:1016860

Trust: 1.6

db:SECTRACKid:1016859

Trust: 1.6

db:SECTRACKid:1016858

Trust: 1.6

db:VUPENid:ADV-2006-3899

Trust: 1.6

db:VUPENid:ADV-2006-3622

Trust: 1.6

db:VUPENid:ADV-2006-3617

Trust: 1.6

db:USCERTid:TA06-312A

Trust: 1.6

db:CERT/CCid:VU#773548

Trust: 1.0

db:VUPENid:ADV-2007-0293

Trust: 1.0

db:VUPENid:ADV-2008-0083

Trust: 1.0

db:VUPENid:ADV-2006-3748

Trust: 1.0

db:VUPENid:ADV-2007-1198

Trust: 1.0

db:SECUNIAid:24711

Trust: 1.0

db:SECUNIAid:22992

Trust: 1.0

db:SECUNIAid:22044

Trust: 1.0

db:SECUNIAid:22056

Trust: 1.0

db:SECUNIAid:23883

Trust: 1.0

db:SECUNIAid:22066

Trust: 1.0

db:SECUNIAid:22446

Trust: 1.0

db:SECUNIAid:22195

Trust: 1.0

db:SECUNIAid:22849

Trust: 1.0

db:SECUNIAid:23280

Trust: 0.8

db:SECUNIAid:23309

Trust: 0.8

db:BIDid:20246

Trust: 0.8

db:CERT/CCid:VU#386964

Trust: 0.8

db:AUSCERTid:ESB-2007.0014

Trust: 0.8

db:SECUNIAid:21709

Trust: 0.8

db:BIDid:20042

Trust: 0.8

db:JVNDBid:JVNDB-2006-000557

Trust: 0.8

db:GENTOOid:GLSA-200610-06

Trust: 0.6

db:GENTOOid:GLSA-200609-19

Trust: 0.6

db:GENTOOid:GLSA-200610-01

Trust: 0.6

db:UBUNTUid:USN-350-1

Trust: 0.6

db:UBUNTUid:USN-354-1

Trust: 0.6

db:UBUNTUid:USN-351-1

Trust: 0.6

db:UBUNTUid:USN-352-1

Trust: 0.6

db:UBUNTUid:USN-361-1

Trust: 0.6

db:DEBIANid:DSA-1192

Trust: 0.6

db:DEBIANid:DSA-1191

Trust: 0.6

db:REDHATid:RHSA-2006:0676

Trust: 0.6

db:REDHATid:RHSA-2006:0675

Trust: 0.6

db:REDHATid:RHSA-2006:0677

Trust: 0.6

db:SUSEid:SUSE-SA:2006:055

Trust: 0.6

db:SUSEid:SUSE-SA:2006:054

Trust: 0.6

db:SUNALERTid:102648

Trust: 0.6

db:MLISTid:[IETF-OPENPGP] 20060827 BLEICHENBACHER'S RSA SIGNATURE FORGERY BASED ON IMPLEMENTATION ERROR

Trust: 0.6

db:CERT/CCid:TA06-312A

Trust: 0.6

db:MANDRIVAid:MDKSA-2006:169

Trust: 0.6

db:MANDRIVAid:MDKSA-2006:168

Trust: 0.6

db:CNNVDid:CNNVD-200609-270

Trust: 0.6

db:CERT/CCid:VU#594904

Trust: 0.3

db:BIDid:19849

Trust: 0.3

db:CERT/CCid:VU#554780

Trust: 0.2

db:CERT/CCid:VU#933712

Trust: 0.2

db:CERT/CCid:VU#596848

Trust: 0.2

db:CERT/CCid:VU#381508

Trust: 0.2

db:SECUNIAid:21996

Trust: 0.2

db:PACKETSTORMid:51021

Trust: 0.1

db:PACKETSTORMid:50178

Trust: 0.1

db:PACKETSTORMid:50749

Trust: 0.1

db:PACKETSTORMid:50366

Trust: 0.1

db:PACKETSTORMid:52156

Trust: 0.1

db:PACKETSTORMid:51167

Trust: 0.1

db:PACKETSTORMid:50269

Trust: 0.1

db:PACKETSTORMid:50537

Trust: 0.1

db:USCERTid:TA06-333A

Trust: 0.1

db:PACKETSTORMid:52708

Trust: 0.1

sources: CERT/CC: VU#386964 // CERT/CC: VU#773548 // CERT/CC: VU#845620 // BID: 19849 // JVNDB: JVNDB-2006-000557 // PACKETSTORM: 51021 // PACKETSTORM: 50178 // PACKETSTORM: 50749 // PACKETSTORM: 50366 // PACKETSTORM: 52156 // PACKETSTORM: 51167 // PACKETSTORM: 50269 // PACKETSTORM: 50537 // PACKETSTORM: 52708 // CNNVD: CNNVD-200609-270 // NVD: CVE-2006-4340

REFERENCES

url:http://www.imc.org/ietf-openpgp/mail-archive/msg14307.html

Trust: 2.7

url:http://www.matasano.com/log/469/many-rsa-signatures-may-be-forgeable-in-openssl-and-elsewhere/

Trust: 2.4

url:http://www.mozilla.org/security/announce/2006/mfsa2006-60.html

Trust: 2.1

url:http://support.avaya.com/elmodocs2/security/asa-2006-224.htm

Trust: 1.9

url:http://security.gentoo.org/glsa/glsa-200609-19.xml

Trust: 1.7

url:http://www.securityfocus.com/bid/22083

Trust: 1.6

url:http://www.us-cert.gov/cas/techalerts/ta06-312a.html

Trust: 1.6

url:http://www.redhat.com/support/errata/rhsa-2006-0677.html

Trust: 1.6

url:http://www.redhat.com/support/errata/rhsa-2006-0676.html

Trust: 1.6

url:http://secunia.com/advisories/21949

Trust: 1.6

url:http://secunia.com/advisories/21906

Trust: 1.6

url:http://www.us.debian.org/security/2006/dsa-1191

Trust: 1.6

url:http://www.ubuntu.com/usn/usn-361-1

Trust: 1.6

url:http://www.ubuntu.com/usn/usn-354-1

Trust: 1.6

url:http://www.ubuntu.com/usn/usn-352-1

Trust: 1.6

url:http://www.ubuntu.com/usn/usn-351-1

Trust: 1.6

url:http://www.ubuntu.com/usn/usn-350-1

Trust: 1.6

url:http://www.redhat.com/support/errata/rhsa-2006-0675.html

Trust: 1.6

url:http://www.novell.com/linux/security/advisories/2006_55_ssl.html

Trust: 1.6

url:http://www.novell.com/linux/security/advisories/2006_54_mozilla.html

Trust: 1.6

url:http://www.gentoo.org/security/en/glsa/glsa-200610-06.xml

Trust: 1.6

url:http://www.debian.org/security/2006/dsa-1192

Trust: 1.6

url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-102648-1

Trust: 1.6

url:http://securitytracker.com/id?1016860

Trust: 1.6

url:http://securitytracker.com/id?1016859

Trust: 1.6

url:http://securitytracker.com/id?1016858

Trust: 1.6

url:http://security.gentoo.org/glsa/glsa-200610-01.xml

Trust: 1.6

url:http://secunia.com/advisories/22422

Trust: 1.6

url:http://secunia.com/advisories/22342

Trust: 1.6

url:http://secunia.com/advisories/22299

Trust: 1.6

url:http://secunia.com/advisories/22274

Trust: 1.6

url:http://secunia.com/advisories/22247

Trust: 1.6

url:http://secunia.com/advisories/22226

Trust: 1.6

url:http://secunia.com/advisories/22210

Trust: 1.6

url:http://secunia.com/advisories/22088

Trust: 1.6

url:http://secunia.com/advisories/22074

Trust: 1.6

url:http://secunia.com/advisories/22055

Trust: 1.6

url:http://secunia.com/advisories/22036

Trust: 1.6

url:http://secunia.com/advisories/22025

Trust: 1.6

url:http://secunia.com/advisories/22001

Trust: 1.6

url:http://secunia.com/advisories/21950

Trust: 1.6

url:http://secunia.com/advisories/21940

Trust: 1.6

url:http://secunia.com/advisories/21939

Trust: 1.6

url:http://secunia.com/advisories/21916

Trust: 1.6

url:http://secunia.com/advisories/21915

Trust: 1.6

url:http://secunia.com/advisories/21903

Trust: 1.6

url:http://www.frsirt.com/english/advisories/2006/3617

Trust: 1.4

url:http://www.mozilla.org/security/announce/2006/mfsa2006-66.html

Trust: 1.3

url:http://support.avaya.com/elmodocs2/security/asa-2006-250.htm

Trust: 1.3

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-4340

Trust: 1.2

url:http://www.kb.cert.org/vuls/id/845620

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/30098

Trust: 1.0

url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-102781-1

Trust: 1.0

url:http://secunia.com/advisories/22066

Trust: 1.0

url:http://www.vupen.com/english/advisories/2006/3899

Trust: 1.0

url:http://secunia.com/advisories/22446

Trust: 1.0

url:http://secunia.com/advisories/22849

Trust: 1.0

url:http://www.vupen.com/english/advisories/2008/0083

Trust: 1.0

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a11007

Trust: 1.0

url:http://www.debian.org/security/2006/dsa-1210

Trust: 1.0

url:http://www.vupen.com/english/advisories/2006/3748

Trust: 1.0

url:http://secunia.com/advisories/22195

Trust: 1.0

url:http://secunia.com/advisories/22056

Trust: 1.0

url:http://www.mandriva.com/security/advisories?name=mdksa-2006:169

Trust: 1.0

url:http://www.vupen.com/english/advisories/2007/1198

Trust: 1.0

url:http://www1.itrc.hp.com/service/cki/docdisplay.do?docid=c00771742

Trust: 1.0

url:http://secunia.com/advisories/22044

Trust: 1.0

url:http://secunia.com/advisories/23883

Trust: 1.0

url:http://secunia.com/advisories/24711

Trust: 1.0

url:http://www.securityfocus.com/archive/1/446140/100/0/threaded

Trust: 1.0

url:http://secunia.com/advisories/22992

Trust: 1.0

url:https://issues.rpath.com/browse/rpl-640

Trust: 1.0

url:http://www.vupen.com/english/advisories/2007/0293

Trust: 1.0

url:ftp://patches.sgi.com/support/free/security/advisories/20060901-01-p.asc

Trust: 1.0

url:http://www.vupen.com/english/advisories/2006/3622

Trust: 1.0

url:http://www.vupen.com/english/advisories/2006/3617

Trust: 1.0

url:http://www.mandriva.com/security/advisories?name=mdksa-2006:168

Trust: 1.0

url:http://www.openssl.org/news/secadv_20060928.txt

Trust: 0.8

url:http://jvn.jp/cert/jvnvu%23386964/index.html

Trust: 0.8

url:http://secunia.com/advisories/23280/

Trust: 0.8

url:http://secunia.com/advisories/23309/

Trust: 0.8

url:http://www.securityfocus.com/bid/20246

Trust: 0.8

url:http://www.gzip.org/

Trust: 0.8

url:http://www.auscert.org.au/7179

Trust: 0.8

url:http://www.openssl.org/news/secadv_20060905.txt

Trust: 0.8

url:http://secunia.com/advisories/21709/

Trust: 0.8

url:http://www.rsasecurity.com/rsalabs/node.asp?id=2125

Trust: 0.8

url:http://www.ietf.org/rfc/rfc3447.txt

Trust: 0.8

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2006-4340

Trust: 0.8

url:http://secunia.com/advisories/21906/

Trust: 0.8

url:http://www.securityfocus.com/bid/20042

Trust: 0.8

url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-102656-1&searchclause=

Trust: 0.6

url:http://www.frsirt.com/english/advisories/2006/3899

Trust: 0.6

url:http://www.frsirt.com/english/advisories/2006/3622

Trust: 0.6

url:http://frontal2.mandriva.com/security/advisories?name=mdksa-2006:169

Trust: 0.6

url:http://frontal2.mandriva.com/security/advisories?name=mdksa-2006:168

Trust: 0.6

url:http://freshmeat.net/projects/bouncycastlecryptoapi/releases/265580

Trust: 0.3

url:http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&id=3117

Trust: 0.3

url:http://docs.info.apple.com/article.html?artnum=304829

Trust: 0.3

url:http://support.avaya.com/elmodocs2/security/asa-2006-188.htm

Trust: 0.3

url:http://support.avaya.com/elmodocs2/security/asa-2006-196.htm

Trust: 0.3

url:http://support.avaya.com/elmodocs2/security/asa-2006-246.htm

Trust: 0.3

url:http://www.isc.org/index.pl?/sw/bind/bind9.4-beta.php

Trust: 0.3

url:http://marc.theaimsgroup.com/?l=bind-announce&m=116253119512445&w=2

Trust: 0.3

url:http://www.bluecoat.com

Trust: 0.3

url:http://www.cisco.com/warp/public/707/cisco-air-20061108-openssl.shtml

Trust: 0.3

url:http://www.cisco.com/warp/public/707/cisco-sr-20061108-openssl.shtml

Trust: 0.3

url:http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujan2007.html

Trust: 0.3

url:http://www.cdc.informatik.tu-darmstadt.de/securebrowser/

Trust: 0.3

url:http://www.ipcop.org/modules.php?op=modload&name=news&file=article&sid=31&mode=thread&order=0&thold=0

Trust: 0.3

url:ftp://ftp.netbsd.org/pub/netbsd/security/advisories/netbsd-sa2006-023.txt.asc

Trust: 0.3

url:http://support.attachmate.com/techdocs/2137.html

Trust: 0.3

url:http://www.ingate.com/relnote-451.php

Trust: 0.3

url:http://rhn.redhat.com/errata/rhsa-2006-0735.html

Trust: 0.3

url:http://rhn.redhat.com/errata/rhsa-2006-0661.html

Trust: 0.3

url:http://rhn.redhat.com/errata/rhsa-2006-0675.html

Trust: 0.3

url:http://rhn.redhat.com/errata/rhsa-2006-0676.html

Trust: 0.3

url:http://rhn.redhat.com/errata/rhsa-2006-0677.html

Trust: 0.3

url:http://rhn.redhat.com/errata/rhsa-2006-0733.html

Trust: 0.3

url:http://rhn.redhat.com/errata/rhsa-2006-0734.html

Trust: 0.3

url:http://www.openssl.org/news/secadv_20060905.txt

Trust: 0.3

url:http://www.ssh.com/company/news/2006/english/security/article/786/

Trust: 0.3

url:http://www.arkoon.fr/upload/alertes/44ak-2006-04-en-1.1_ssl360_openssl_rsa.pdf

Trust: 0.3

url:http://www1.vandyke.com/support/advisory/2007/01/845620.html

Trust: 0.3

url:http://www.openoffice.org/security/cves/cve-2006-4339.html

Trust: 0.3

url:http://www.bluecoat.com/support/knowledge/openssl_rsa_signature_forgery.html

Trust: 0.3

url:http://www.slackware.com/security/list.php?l=slackware-security&y=2006

Trust: 0.3

url:http://www.cyberguard.info/snapgear/releases.html

Trust: 0.3

url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-102657-1&searchclause=

Trust: 0.3

url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-102696-1&searchclause=

Trust: 0.3

url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-102722-1&searchclause=

Trust: 0.3

url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-102744-1&searchclause=

Trust: 0.3

url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-102648-1&searchclause=

Trust: 0.3

url:http://www.vmware.com/support/server/doc/releasenotes_server.html

Trust: 0.3

url:/archive/1/446038

Trust: 0.3

url:http://docs.info.apple.com/article.html?artnum=307177

Trust: 0.3

url:http://support.avaya.com/elmodocs2/security/asa-2007-091.htm

Trust: 0.3

url:https://www.itrc.hp.com/service/cki/docdisplay.do?docid=emr_na-c02475053

Trust: 0.3

url:http://www2.itrc.hp.com/service/cki/docdisplay.do?admit=-1335382922+1174502331230+28353475&docid=c00774579

Trust: 0.3

url:http://lists.grok.org.uk/pipermail/full-disclosure/2007-january/051708.html

Trust: 0.3

url:https://rhn.redhat.com/errata/rhsa-2007-0062.html

Trust: 0.3

url:http://rhn.redhat.com/errata/rhsa-2007-0072.html

Trust: 0.3

url:http://rhn.redhat.com/errata/rhsa-2008-0264.html

Trust: 0.3

url:http://rhn.redhat.com/errata/rhsa-2008-0525.html

Trust: 0.3

url:http://rhn.redhat.com/errata/rhsa-2008-0629.html

Trust: 0.3

url:https://secure-support.novell.com/kanisaplatform/publishing/41/3143224_f.sal_public.html

Trust: 0.3

url:http://sunsolve.sun.com/search/document.do?assetkey=1-66-200708-1

Trust: 0.3

url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-102759-1

Trust: 0.3

url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-102759-1&searchclause=

Trust: 0.3

url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-102781-1&searchclause=

Trust: 0.3

url:http://www.sybase.com/detail?id=1047991

Trust: 0.3

url:http://www.kb.cert.org/vuls/id/594904

Trust: 0.3

url:http://security.gentoo.org/

Trust: 0.3

url:http://bugs.gentoo.org.

Trust: 0.3

url:http://creativecommons.org/licenses/by-sa/2.5

Trust: 0.3

url:http://secunia.com/

Trust: 0.3

url:http://lists.grok.org.uk/full-disclosure-charter.html

Trust: 0.3

url:http://security.gentoo.org/glsa/glsa-200610-06.xml

Trust: 0.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-4339

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2006-4568

Trust: 0.2

url:http://www.debian.org/security/faq

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2006-4566

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2006-4565

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2006-4340

Trust: 0.2

url:http://security.debian.org/

Trust: 0.2

url:http://www.debian.org/security/

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2006-4571

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2006-2788

Trust: 0.2

url:http://packages.debian.org/<pkg>

Trust: 0.2

url:http://www.mozilla.org/security/announce/2006/mfsa2006-64.html

Trust: 0.2

url:http://www.mandriva.com/security/

Trust: 0.2

url:http://www.mozilla.org/security/announce/2006/mfsa2006-57.html

Trust: 0.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-4565

Trust: 0.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-4566

Trust: 0.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-4571

Trust: 0.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-4253

Trust: 0.2

url:http://www.mandriva.com/security/advisories

Trust: 0.2

url:http://www.mozilla.org/security/announce/2006/mfsa2006-59.html

Trust: 0.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-4567

Trust: 0.2

url:http://www.mozilla.org/security/announce/2006/mfsa2006-58.html

Trust: 0.2

url:http://www.kb.cert.org/vuls/id/554780

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://www.kb.cert.org/vuls/id/381508

Trust: 0.1

url:http://secunia.com/quality_assurance_analyst/

Trust: 0.1

url:http://secunia.com/product/4220/

Trust: 0.1

url:http://www.kb.cert.org/vuls/id/773548

Trust: 0.1

url:http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=204676

Trust: 0.1

url:http://secunia.com/hardcore_disassembler_and_reverse_engineer/

Trust: 0.1

url:http://www.kb.cert.org/vuls/id/933712

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://www.kb.cert.org/vuls/id/596848

Trust: 0.1

url:http://secunia.com/advisories/21996/

Trust: 0.1

url:http://secunia.com/web_application_security_specialist/

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.3.1_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge7.3.1_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge7.3.1_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge7.3.1_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge7.3.1_m68k.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.3.1_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge7.3.1_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.3.1_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge7.3.1_m68k.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge7.3.1_m68k.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge7.3.1_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge7.3.1_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge7.3.1_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge7.3.1_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge7.3.1_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge7.3.1_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.3.1_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge7.3.1_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge7.3.1_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge7.3.1_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge7.3.1_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge7.3.1_m68k.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge7.3.1_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge7.3.1_m68k.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge7.3.1_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge7.3.1_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge7.3.1_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge7.3.1_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge7.3.1_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge7.3.1_arm.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.3.1_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge7.3.1_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge7.3.1_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge7.3.1_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge7.3.1_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge7.3.1_arm.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge7.3.1_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge7.3.1_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge7.3.1_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge7.3.1_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge7.3.1_arm.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge7.3.1_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge7.3.1_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge7.3.1_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge7.3.1_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge7.3.1_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge7.3.1_arm.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge7.3.1_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge7.3.1_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge7.3.1_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge7.3.1_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge7.3.1_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge7.3.1_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge7.3.1_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8.orig.tar.gz

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge7.3.1_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.3.1_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge7.3.1_arm.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge7.3.1_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge7.3.1_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge7.3.1_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge7.3.1_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge7.3.1_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge7.3.1_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge7.3.1_m68k.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge7.3.1_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge7.3.1_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge7.3.1_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge7.3.1_arm.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge7.3.1_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge7.3.1_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge7.3.1_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge7.3.1_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge7.3.1_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge7.3.1_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge7.3.1_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge7.3.1_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge7.3.1_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge7.3.1_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.3.1_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge7.3.1_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.3.1_m68k.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge7.3.1_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge7.3.1_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge7.3.1_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.3.1_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.3.1.diff.gz

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge7.3.1_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge7.3.1_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge7.3.1_s390.deb

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2006-4570

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge7.3.1_m68k.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge7.3.1_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge7.3.1_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge7.3.1_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge7.3.1_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge7.3.1_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge7.3.1_m68k.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge7.3.1_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge7.3.1_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge7.3.1_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge7.3.1_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge7.3.1_arm.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge7.3.1_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge7.3.1_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge7.3.1_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge7.3.1_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge7.3.1_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge7.3.1_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge7.3.1_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge7.3.1_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge7.3.1_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge7.3.1_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge7.3.1_arm.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge7.3.1_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge7.3.1_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.3.1_arm.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge7.3.1_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge7.3.1_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge7.3.1_arm.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge7.3.1_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge7.3.1_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge7.3.1_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge7.3.1_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge7.3.1_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge7.3.1_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge7.3.1_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge7.3.1_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge7.3.1_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge7.3.1_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge7.3.1_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge7.3.1_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge7.3.1_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge7.3.1_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.3.1_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge7.3.1_m68k.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge7.3.1_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge7.3.1_m68k.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge7.3.1_m68k.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge7.3.1_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge7.3.1_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/libnspr4_1.7.8-1sarge7.3.1_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge7.3.1_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge7.3.1_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla-chatzilla_1.7.8-1sarge7.3.1_m68k.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.3.1_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dev_1.7.8-1sarge7.3.1_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge7.3.1_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla-browser_1.7.8-1sarge7.3.1_arm.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla-dom-inspector_1.7.8-1sarge7.3.1_arm.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge7.3.1_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/libnspr-dev_1.7.8-1sarge7.3.1_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla-js-debugger_1.7.8-1sarge7.3.1_arm.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla_1.7.8-1sarge7.3.1.dsc

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/libnss-dev_1.7.8-1sarge7.3.1_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla-psm_1.7.8-1sarge7.3.1_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge7.3.1_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla-calendar_1.7.8-1sarge7.3.1_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/mozilla-mailnews_1.7.8-1sarge7.3.1_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla/libnss3_1.7.8-1sarge7.3.1_powerpc.deb

Trust: 0.1

url:http://www.mozilla.org/security/announce/2006/mfsa2006-63.html

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-4570

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge12_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge12.dsc

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge12_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge12_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge12_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge12_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge12_arm.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge12_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge12_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge12_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge12_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge12_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge12_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge12_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge12_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge12_m68k.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge12_m68k.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4.orig.tar.gz

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge12_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge12_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge12_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge12_m68k.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge12_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge12_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge12.diff.gz

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge12_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge12_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge12_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge12_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge12_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge12_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge12_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge12_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge12_arm.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-gnome-support_1.0.4-2sarge12_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge12_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge12_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox_1.0.4-2sarge12_arm.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/m/mozilla-firefox/mozilla-firefox-dom-inspector_1.0.4-2sarge12_mipsel.deb

Trust: 0.1

url:http://www.mozilla.org/security/announce/2006/mfsa2006-61.html

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-4569

Trust: 0.1

url:http://www.mozilla.org/security/announce/2006/mfsa2006-62.html

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-4568

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=3dcve-2006-4567

Trust: 0.1

url:http://enigmail.mozdev.org

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=3dcve-2006-4566

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=3dcve-2006-4253

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=3dcve-2006-4569

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=3dcve-2006-4565

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=3dcve-2006-4340

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=3dcve-2006-4571

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=3dcve-2006-4568

Trust: 0.1

url:http://www.kb.cert.org/vuls/id/845620>

Trust: 0.1

url:http://www.kb.cert.org/vuls/id/773548>

Trust: 0.1

url:http://www.kb.cert.org/vuls/id/933712>

Trust: 0.1

url:http://www.us-cert.gov/cas/techalerts/ta06-333a.html>

Trust: 0.1

url:http://www.kb.cert.org/vuls/id/596848>

Trust: 0.1

url:http://www.openssl.org/news/vulnerabilities.html>

Trust: 0.1

url:http://docs.info.apple.com/article.html?artnum=304829>

Trust: 0.1

url:http://www.us-cert.gov/reading_room/securing_browser/#safari>

Trust: 0.1

url:http://www.kb.cert.org/vuls/byid?searchview&query=apple-2006-007>

Trust: 0.1

url:http://www.kb.cert.org/vuls/id/381508>

Trust: 0.1

url:http://www.apple.com/support/downloads/>

Trust: 0.1

url:http://www.kb.cert.org/vuls/byid?searchview&query=openssl_secadv_20060928>

Trust: 0.1

url:http://docs.info.apple.com/article.html?artnum=106704>

Trust: 0.1

url:http://www.us-cert.gov/legal.html>

Trust: 0.1

url:http://www.kb.cert.org/vuls/id/554780>

Trust: 0.1

sources: CERT/CC: VU#386964 // CERT/CC: VU#773548 // CERT/CC: VU#845620 // BID: 19849 // JVNDB: JVNDB-2006-000557 // PACKETSTORM: 51021 // PACKETSTORM: 50178 // PACKETSTORM: 50749 // PACKETSTORM: 50366 // PACKETSTORM: 52156 // PACKETSTORM: 51167 // PACKETSTORM: 50269 // PACKETSTORM: 50537 // PACKETSTORM: 52708 // CNNVD: CNNVD-200609-270 // NVD: CVE-2006-4340

CREDITS

Daniel Bleichenbacher

Trust: 0.6

sources: CNNVD: CNNVD-200609-270

SOURCES

db:CERT/CCid:VU#386964
db:CERT/CCid:VU#773548
db:CERT/CCid:VU#845620
db:BIDid:19849
db:JVNDBid:JVNDB-2006-000557
db:PACKETSTORMid:51021
db:PACKETSTORMid:50178
db:PACKETSTORMid:50749
db:PACKETSTORMid:50366
db:PACKETSTORMid:52156
db:PACKETSTORMid:51167
db:PACKETSTORMid:50269
db:PACKETSTORMid:50537
db:PACKETSTORMid:52708
db:CNNVDid:CNNVD-200609-270
db:NVDid:CVE-2006-4340

LAST UPDATE DATE

2024-12-10T19:54:33.958000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#386964date:2011-07-22T00:00:00
db:CERT/CCid:VU#773548date:2011-07-22T00:00:00
db:CERT/CCid:VU#845620date:2007-02-08T00:00:00
db:BIDid:19849date:2015-03-19T08:19:00
db:JVNDBid:JVNDB-2006-000557date:2007-04-27T00:00:00
db:CNNVDid:CNNVD-200609-270date:2006-11-10T00:00:00
db:NVDid:CVE-2006-4340date:2024-11-21T00:15:43.160

SOURCES RELEASE DATE

db:CERT/CCid:VU#386964date:2006-09-28T00:00:00
db:CERT/CCid:VU#773548date:2006-09-19T00:00:00
db:CERT/CCid:VU#845620date:2006-09-11T00:00:00
db:BIDid:19849date:2006-09-05T00:00:00
db:JVNDBid:JVNDB-2006-000557date:2007-04-01T00:00:00
db:PACKETSTORMid:51021date:2006-10-20T22:34:17
db:PACKETSTORMid:50178date:2006-09-21T23:56:25
db:PACKETSTORMid:50749date:2006-10-09T04:16:16
db:PACKETSTORMid:50366date:2006-10-02T23:40:01
db:PACKETSTORMid:52156date:2006-11-16T15:41:20
db:PACKETSTORMid:51167date:2006-10-20T22:34:17
db:PACKETSTORMid:50269date:2006-09-26T19:59:02
db:PACKETSTORMid:50537date:2006-10-04T00:43:37
db:PACKETSTORMid:52708date:2006-12-06T02:47:36
db:CNNVDid:CNNVD-200609-270date:2001-10-16T00:00:00
db:NVDid:CVE-2006-4340date:2006-09-15T18:07:00